NTS(r2, 0x84, 0xb, &(0x7f0000e99000), 0x1ed) 2018/04/13 09:11:34 executing program 4: mmap(&(0x7f0000000000/0x8a0000)=nil, 0x8a0000, 0x4, 0x30031, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x100080000, 0x0) remap_file_pages(&(0x7f000012a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) times(&(0x7f00000002c0)) sigaltstack(&(0x7f00002ef000/0x1000)=nil, 0x0) keyctl$instantiate(0xc, r2, &(0x7f0000000140), 0x0, 0x0) poll(&(0x7f0000000040), 0x0, 0x0) mbind(&(0x7f000006b000/0x800000)=nil, 0x800000, 0x1, &(0x7f00008a0000), 0x1, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) setgid(r3) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x284083, 0x0) [ 230.978997] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 230.986137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)="7ef2f45aee44d03457c6a8fc5c3ae324b6c3def347f14548ce2afefac323dc39ca272c51887f076873fb38bf382d30254a032a49ba789b47fa81e84b93352f8bd76e4f58433768d6be08b21510363fbafd94b3b0d8fca319fa66423d6a7ec35ee5cd", 0x62, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, r3, 0x100) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)={0x2, 0x0, [{0x80000008, 0xe013}, {0x1}]}) 2018/04/13 09:11:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$rdma_cm(r0, &(0x7f0000000180)=@leave_mcast={0x11, 0x0, 0xfa00, {&(0x7f0000000080)}}, 0x142) 2018/04/13 09:11:35 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x101000) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x0) inotify_init1(0x0) close(r1) ioctl$KVM_RUN(r0, 0xae80, 0x0) 2018/04/13 09:11:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-asm,ghash-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="d3ab27191a010023560fd9d5e03eba602dff05b82756df62", 0x18) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000001700)=""/4096, 0x1000}], 0x1, &(0x7f0000000340)=""/80, 0x50}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x10000, 0x0) 2018/04/13 09:11:35 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000540)='/dev/sg#\x00', 0x8, 0x288000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0x5a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x158) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x800, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, r3, 0x0, 0x70bd26, 0x25dfdbfd, {0xe}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8d4}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x48000) ioctl$TIOCNOTTY(r0, 0x5422) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r5 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r5, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r4, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:35 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006a4ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SMI(r2, 0xaeb7) fcntl$dupfd(r0, 0x406, r2) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000180)="ea0300120126f267f22e260f2364660fd32a66b9470200000f320f20470f08baf80c66b88f4c858566efbafc0cec0fc75c20dce1440f20c0663501000000440f22c0", 0x42}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'ifb0\x00', 0x5}) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000000)="bba6013c95f36b1f672296de00626b34779e08f7d7", 0x0, 0x15}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/13 09:11:35 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x8, 0x1}, 'port0\x00', 0x10, 0x40, 0x4, 0x0, 0xfffffffffffffffe, 0x4, 0x5, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) [ 231.928836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:35 executing program 5: r0 = memfd_create(&(0x7f0000000000)='+\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8001f}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x6, 0xfcb6, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/13 09:11:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000011c0)={0x4, 0x20a, 0x5, 0x3, 0x0}, &(0x7f0000001200)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={r1, 0xffffffff}, &(0x7f00000010c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001100)={r2, @in={{0x2, 0x4e21, @loopback=0x7f000001}}}, 0x84) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000080)) mlock(&(0x7f0000fef000/0x1000)=nil, 0x1000) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/4096, 0x1000, 0x0) 2018/04/13 09:11:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x10, r0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x1263, 0x0) 2018/04/13 09:11:36 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x204040) getsockname$inet(r0, &(0x7f0000000400)={0x0, 0x0, @loopback}, &(0x7f0000000440)=0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:36 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:36 executing program 3: r0 = getpgrp(0x0) ptrace$getenv(0x4201, r0, 0x2, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x1f) writev(r1, &(0x7f0000bafff0)=[{&(0x7f0000000100)="29000000200019fff63d89170c4df109ca64000d15de0005190000040d000c000000800000f900001e", 0x29}], 0x10000000000000ff) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x610001) ioctl$DRM_IOCTL_VERSION(r2, 0xc0406400, &(0x7f0000000240)={0x5, 0x5, 0x2, 0x5f, &(0x7f0000000080)=""/95, 0x99, &(0x7f0000000140)=""/153, 0x2b, &(0x7f0000000200)=""/43}) 2018/04/13 09:11:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xffffffffffffffa9, 0x80080) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000140)=0x7) bind$inet6(r0, &(0x7f0000f61fe4)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0xc000) r4 = dup3(r0, r3, 0x80000) msgget$private(0x0, 0x240) ioctl$KVM_S390_VCPU_FAULT(r4, 0x4008ae52, &(0x7f00000000c0)=0x18cfbad2) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000040)=""/70) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x0) r5 = socket$inet6(0xa, 0x1, 0x800000000000) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) connect$inet6(r0, &(0x7f0000f6dfe4)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x2}, 0x1c) bind$inet6(r5, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 2018/04/13 09:11:36 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x8, 0x1}, 'port0\x00', 0x10, 0x40, 0x4, 0x0, 0xfffffffffffffffe, 0x4, 0x5, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 09:11:36 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000053b000)={0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f0000000040)={r1}) gettid() 2018/04/13 09:11:36 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x100000, 0x14cbb59bb63f1631, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}, @sadb_x_sa2={0x0, 0x13, 0xfffffffffffffffd, 0x0, 0x0, 0x70bd2d}, @sadb_x_policy={0x8, 0x12, 0x4, 0x1, 0x0, 0x0, 0x80000001, {0x6, 0x6c, 0x0, 0x0, 0x0, 0x2, 0x0, @in=@dev={0xac, 0x14, 0x14, 0xa}, @in=@multicast1=0xe0000001}}]}, 0xc3}, 0x1}, 0x0) 2018/04/13 09:11:36 executing program 4: r0 = inotify_init() fsetxattr(r0, &(0x7f0000000000)=@random={'user.', 'bdev\x00'}, &(0x7f0000000080)='/dev/kvm\x00', 0x9, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000040)=0xffffffffffffffff) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000100)="0f20c035040000000f22c0640fc7a8000000000f20e035010000000f22e0b9510b0000b80d000000ba000000000f30c46239f7b4a6008000000f01c866b8e5008ed00f07c46179d7e3410f2083", 0x4d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000005c0)={"3c76ec53299f8519973f9086bb292c9be39126025dca1eaf80247173e08854b7b83404fab20a3f49dc0348115c5f40dfdd6ac90bce31664a2fff0d9646170dedb16daa9d40f0646739072b022407000000000000ef3907060000000000000028db052584309d89c878a13615d2f8d26ec640bff1d3552c3da6d47b258e9c6efea0e44a9abf8b1df2df4a633ea7efb1167fea42a1a64b874c3f3b4d7008b7d1b429fc2b829b2955a041d790e89853809196a25005cdc6e8c2080090e71e2fee914bee0c4d3e6d16da68cb75e19727254d0c43bba4d0f27f649f852258b80c42095dda143db25a5e0ae1f83c3df37fd8482577869c26f5d12767569ba2fe1f79dc51f0436a00db4385a119e1542527e66419d6c28dc5e2417232b6c2b03c750c2cec9ff6864dd476a6e22f2bff71417f6a3e9028e2ae0778432e797a1464d70839ef2f4b334c11285c7a675e043fd39517198c767112896ea084a467a86af24e812cf10c191cedcb8d913c4689db720800000000000000477d5d9f8e58f9a015633c75c63ea5d6f8e3719781609bb0fe5b14bb7e4ccb83a60bbdb52c6c406fd2dbd08352ce510cacf886a6153026b8dba95d38fc4b6b3b4bcf1536a7dec889836b8ced33a8154c6e41bf0b528b95de216d3b8664e4bc44358fb20ba57aad1098fd73818ec9bb610c9b14fc2695e0fb00d28cc1612ab8982583dba6afe7c980d96b6faee937bb9b361ebc882d93f06e1adc6331f96023d53b8096ffe069b2fe93713b95b89fa622879e97e040d7696ebe24bd5f1742dc29bddf95c513f2881ac7e7a426175c71afea64ab78014e58ea9e2e34d0155ab8acc11e29a1da2a0d6e47d18e05df9f1097a205df152a22d2978d311253f46ae43a9c4cb203af26112f2a731e00800000f4ae2381a5b1eab83a7ff3cd328095700c2128e27e2ec878a99dafc9bf59be3c30ebdf13e8b708cae6b18f9745c842f45839bc7f27abb5b3cbe0b7af83bc2ce9f503c4714b4c79d79bf749ac4cde07fe428a14874c7722785632475186d763ff004239ab3622a76ab22617e7b622351442ad4cd6626c2e4db2af2acfb744fc530e38675b6b8f473a49126f0dc0b4b6fea45d25ab4d704bc3de0064ca707e37cd3aafa34b0be17890dfb4df2d4a50899125872624b939f9e3ac781cfed29cca9d3b349fd7d20307716163ed5f2bc33e5242d752bb471b006dd1c6f01e783a1636fb3162370bf60052f4d260a85093a582520ad5aca1c56797dec37ad109d9413f5be17e7bdd022112909a6804465ddf7a0a38dd9dfcb915c2c0746e22196ecda798689b8f40836e9b0dc0b63b3f306b48aad06f847a9122fa1867dd80a45fe42fd3e6cbe8c5b186286db557ed740a719130736164ffa3461aecfe60bf558a83ddf725fbac979bcc90265ff07dcfd3a3e7a50b00eed8a263163c3af7"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 233.054949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:36 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@dev, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) socket$key(0xf, 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@remote}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r1, r2) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000002c0)={0x2, 0x0, 0x10001, 0xffff}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000300)={0x1, r3}) socket$key(0xf, 0x3, 0x2) futex(&(0x7f00000000c0), 0x5, 0x0, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000440), 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x1, 0x800, 0x9, 0x8}, 0x8) r4 = msgget(0x2, 0x2) msgsnd(r4, &(0x7f0000000580)={0x2, "fc6d16034247c09006539bf5ce9ee10a728868c6315610d13f6d866016bf7d646bbd812aea661102578663a4dec7652ceaf99704a5b824c153d56e0b41cc7eb995942d5abe1cfd41635cd16e9f222455dde4ef219e072bc41f1ec19d6e9b0004f246056822177b0ca0255f6336cd55e6956003c0f531818d2d08f1096f600f2729532304"}, 0x8c, 0x800) 2018/04/13 09:11:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000280)=@ethtool_drvinfo={0x3, "01436e469b13685e115137feb1b220939964c76516f8f9b76e322fa8c5739b5c", "51732243098bf7d58254c9f902dc5194a73fbbf87af252853e76a92d88dc171f", "53f44378ce62e06c9e6dc2c8ae8bad79ec166edf0cbf4c7cb787b04c23fc1445", "a70c077b098a46f94523a2f0f28a759468fc7d0ad6d559e149d00a69d3afe2c4", "fad3b3a9dd2f37c0d033e7d20216517d32e925912877b50ce0c0c41170123a79", "b9aba04079cdeba4e7d4b56a", 0xffffffffffffff7f, 0xffffffffffffffc0, 0x2, 0x40, 0x4}}) 2018/04/13 09:11:37 executing program 3: getrandom(&(0x7f0000000180)=""/188, 0xffffffffffffff14, 0x0) 2018/04/13 09:11:37 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000b6cff6)='net/udp\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000f15ff0)={0x2, 0x4e22, @rand_addr}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000f10000)=0x10000, 0x4) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r3 = semget$private(0x0, 0x3, 0x110) semctl$IPC_RMID(r3, 0x0, 0x0) preadv(r0, &(0x7f0000331000)=[{&(0x7f0000723f20)=""/127, 0xfd4a}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0xa3, "de901f4f1aaef16706b93b46e111074f8e48e66dac26984419283d5b49817795392d2d8846ebe76d60825e0474b451a88c8cef0eca7a22670eafc6b1eb9e1b0d0ca28b18e0109b7d8d35c21aca680c3e7061d4018416cc4ca653546005f6d3cdcf78011279d50815ce95dd75815c13a4f406dd4f49b8bb4b4e1a5b03b4876da8bd9dc6f01bd77dc57aa6dd38a37a72745b923233759014e5c2f91c5c4c78cbd707cf3d"}, &(0x7f00000000c0)=0xab) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r4, 0x400, 0x4, [0x8001, 0x366, 0x503, 0xb8]}, &(0x7f0000000140)=0x10) 2018/04/13 09:11:37 executing program 1: r0 = socket$inet(0x2, 0x8000000000003, 0x33) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000080)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000640), 0xfd, &(0x7f0000000140)}, 0x0) 2018/04/13 09:11:37 executing program 5: r0 = socket(0x1e, 0x8000b, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0xe1) sendmsg$key(r0, &(0x7f00005af000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00007b1000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000140)=""/131, 0x83, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 2018/04/13 09:11:37 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1bdb42fd1d6fbb89b1a60c1b994db696ab4c0049350e0a"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:37 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x8, 0x1}, 'port0\x00', 0x10, 0x40, 0x4, 0x0, 0xfffffffffffffffe, 0x4, 0x5, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 09:11:37 executing program 1: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r2, 0xb, &(0x7f000058a000)) r3 = dup2(r1, r1) r4 = accept$unix(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000280)={r4}) rt_sigtimedwait(&(0x7f0000001ff8)={0x20000000000fff}, &(0x7f0000000000), &(0x7f0000000040)={0xffffd, 0x989680}, 0x8) 2018/04/13 09:11:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_ipx_SIOCAIPXITFCRT(r0, 0x89e0, &(0x7f0000000080)=0x4) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r1, &(0x7f00000012c0)=@query={0x13, 0x10, 0xfa00, {&(0x7f00000001c0)}}, 0x18) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) [ 234.054881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:37 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000000180)=0xd) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='\\-wlan0}\x00', 0x2) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000080)={0x0, 0x8, 0x3, 0x6, 0x5}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xff}) 2018/04/13 09:11:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000ee1fa8)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r2 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000b78ff0)="a23364fd5e580ef24d71a19dd93fc727", 0x10) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0xc9) sendfile(r2, r3, &(0x7f0000e64ff8), 0x8) 2018/04/13 09:11:37 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000b", 0x10) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write(r1, &(0x7f0000000100)="791f7dfde0814453d81845bc8294794a28", 0x11) r2 = memfd_create(&(0x7f00000000c0)='skcipher\x00', 0x2) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0xffffff2a}], 0x1, &(0x7f0000da2000)}, 0x0) r3 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r3) [ 234.235055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:38 executing program 1: r0 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20}, {0x20, 'securityuser/ppp0wlan0+@&proc@'}], 0xa, "022631d2631b1bc9b2106771160c73c14b5de56c103d94f7ddaf3adac7d15f15247ac95521cedb45c3fafdbfeec58fd25b47"}, 0x5d) mmap(&(0x7f0000000000/0x936000)=nil, 0x936000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82, 0x0) splice(r1, &(0x7f0000000340), r0, &(0x7f0000000380), 0x560fea21, 0x6) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000280)={0x4, &(0x7f0000000240)=[0x8, 0x3c73, 0xfffffffffffffffd, 0x8]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) setgid(r3) timerfd_gettime(r2, &(0x7f0000000040)) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x200001) getpeername(r1, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000140)=0x80) 2018/04/13 09:11:38 executing program 5: unshare(0x8000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f000039a000)={0x5, 0x100, 0x100, 0x2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000269fb8)={0x1, 0x5, &(0x7f00000affc8)=ANY=[@ANYBLOB="1800000000000000000000000000000018160000", @ANYRES32=r0, @ANYBLOB="00000000000100fe940000000000e100"], &(0x7f000039cff6)="7379e66b616c6c657200", 0x8, 0x1000, &(0x7f000039c000)=""/4096}, 0x48) 2018/04/13 09:11:38 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x2001}) r1 = socket$nl_route(0x10, 0x3, 0x0) close(r0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="3000000010000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000d0000000000081b0000000000"], 0x30}, 0x1}, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000340)={0x9}) timerfd_create(0x7, 0x80800) r3 = memfd_create(&(0x7f0000000480)='&\x00', 0x1) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f00000003c0)={0x5e5, 0x0, 0xffffffffffffffa2, 0x0, 0x7ff}) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000000c0)={@remote}, &(0x7f0000000400)=0x14) getsockopt$inet_mreqn(r3, 0x0, 0x0, &(0x7f0000000100)={@loopback, @broadcast}, &(0x7f0000000180)=0xc) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000240)=""/247) sendto$ipx(r2, &(0x7f00000004c0)="d01e8f24779bf2dd92b795746467de5453f7344636a08ea4eba58d6333bdd165821aae67b4f786f10b6c222422c7e0da36da962bf6955b53e1330544be07621005e2063a8cd3a579298a8c71bc9d7fec8975458ca058bcd425626f1f", 0x5c, 0x10, &(0x7f0000000140)={0x4, 0x1, 0xfff, "80604f69bea0", 0x6168}, 0x10) 2018/04/13 09:11:38 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000000180)=0xd) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:38 executing program 3: setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @empty, @broadcast=0xffffffff}, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000) readv(r0, &(0x7f0000000000)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/4096, 0x1000}], 0x10000000000001af) mq_timedsend(r0, &(0x7f0000000100)="c9384f2e4515a745e651221e4f1f5d66709b250ac30d28b880eabfec130b304c75ddc8b09704664faec1cd169f1c147403e0fdb7f1c725699e1db0a4bfdcb95be628711bf3d702381ba0d0b0e29e2f7128dc13acf8c28c0a4c64c44e7fba0448ddd19680d3340e1d1ed16afbd28809c9f5eb594e4a04308fe04f57ee2494627249a63f7dfd16db179712717127f21f4200387c8907cd1a646ddd6b29ce7afd9d355a4e0a8a77df83300eadb5e1b2ec1525c5c7bb972cfe248a0cccfc786eeb430fca", 0xc2, 0x8000, &(0x7f0000000040)) 2018/04/13 09:11:38 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f000019ffe9)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000002c0)={{0x8, 0x1}, 'port0\x00', 0x10, 0x40, 0x4, 0x0, 0xfffffffffffffffe, 0x4, 0x5, 0x0, 0x0, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) 2018/04/13 09:11:38 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000500)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000640)={&(0x7f0000000540)=[0x2], 0x1, 0x401, 0xffffffff, 0x10001, 0x261a, 0x1ff, {0x70f, 0x10001, 0x10001, 0x3, 0x6, 0x8, 0x0, 0x100, 0x3, 0x6, 0xff, 0x9, 0x0, 0x4, "cfc91a4191d50cfaf072b444c93b8cd3daa89b62019e52304c32fa2b6a95a33f"}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) r3 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x3, 0x8400) openat(r3, &(0x7f0000000380)='./file0\x00', 0x4000, 0x2) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r5 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="a7b2ce9f701528f056254c9206359397e335aab1a62b124703f468d2350dabfdc3e28a0cd45ea90806bcfa85a0b71e644865982f1361618d1b96d1d27554e3af79a3be8e848017aef68b212b8df81f7775ee38729eab0f211c0dfa1877851b2488be6a385b3d945cd7a5b7ed223dcbcc6031abe5c8ba0ce7b67b29d33d48b724946f695e3c47a2302405dcab2a15eaa8ae766cee828492ec61dca2e03e0654329d95be93672de8a562a33fad6327cf756f3dfea736f4c736689d33402ad87fe5"], 0x1}, 0x1}, 0x0) connect$unix(r5, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r4, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) [ 235.058530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x3201, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7, 0xc0001) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000100)) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000140)={0x3, 0x5, 0x400}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x1f, 0x4) r4 = socket(0x200000000010, 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f00001cb000)={&(0x7f00008e5ff4)={0x10}, 0xc, &(0x7f0000f4a000)={&(0x7f000019bf9b)={0x14, 0x2a, 0x311}, 0x14}, 0x1}, 0x0) write(r4, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000000000000ffffffff0100ff10", 0x24) recvmmsg(r2, &(0x7f0000001740)=[{{&(0x7f00000001c0)=@alg, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/127, 0x7f}], 0x1, &(0x7f0000000300)=""/213, 0xd5, 0x4}, 0x80000001}, {{&(0x7f0000000400), 0x80, &(0x7f0000001600)=[{&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/229, 0xe5}, {&(0x7f0000001580)=""/100, 0x64}], 0x3, &(0x7f0000001640)=""/250, 0xfa, 0xfffffffffffffc01}, 0x3000000000000000}], 0x2, 0x2060, 0x0) 2018/04/13 09:11:38 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="182de8074375fb4eeefdff810c54798b056ec73a4000b5791913e03e480e5788f67ac0584b4037654ffa2b773e398ae026220e235087898677b6380dde5b77d116c4045e8fdb2e0d9557ac00d18ca5a6b635889dc940760f91b7"], 0x2) 2018/04/13 09:11:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000035d000)={&(0x7f00000002c0)={0x2, 0x18, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @loopback=0x7f000001}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e20}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}]}, 0x80}, 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9, 0x105080) bind$alg(r1, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) r2 = accept(r0, &(0x7f00000001c0)=@vsock, &(0x7f0000000040)=0x80) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240)={0x3ff, 0xff, 0x1, 0x8, 0x1, 0x1, 0x5, 0x2579ec5a, 0x7ff, 0xa7, 0x401}, 0xb) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(aes-aesni)\x00'}, 0x58) mkdir(&(0x7f0000062ff6)='./control\x00', 0x0) r5 = inotify_init1(0x80800) inotify_add_watch(r5, &(0x7f000003cff6)='./control\x00', 0x220001a1) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) read(r5, &(0x7f0000058fef)=""/32, 0x20) pwritev(r3, &(0x7f0000001380)=[{&(0x7f0000000180)="707f3d", 0x3}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000f3eff0)="0000000057d8", 0x6) r6 = accept4(r4, 0x0, &(0x7f0000000140), 0x0) sendfile(r6, r3, &(0x7f00000ddff8), 0x3) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000280)={r3}) 2018/04/13 09:11:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x3201, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000ce7fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80ab40290e858d96, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0b521d820000000000000000000000008a722056466365218ff757ad85464298d73a23e7870fd7452a33c29140ab943d3a7dc4a673badaa4de7b75a07670c41413f5de37e8bec78f18ffc8a782b4ed289620ab57a4162d4d307339a0e0ab1550c5f0820f560555e8ca957bbe4133e46fcc2c9141ac5027dcf1f8a7c16025fab18e7b3b2d0d623b0a462f0bd6202a037912ecfc19ceb5885a4a81690078c7a70f4feba34ddb0e8ed1a592eb6b18caf1b415397d8e0bb4abb87d2a72a896779eee7e928cb227f06778604c0a29547f0c9ae2ab75e0ce3519dee9cbc0df09ecf9bf1d224e3421b1c8c746c833e9d30a8689229786fcf1a445aa05a60f1980e51430a127", 0xf) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000e46000), 0x0, &(0x7f0000000400)=[@iv={0xf0, 0x117, 0x2, 0xdc, "d03d353033f7578c05b7496a3af5d4344917caea14be43734f47f40d26f218b15687d1708e33b0fd4caeb7bd1565d3d91bdcbaf0b5f8ca631756b4187a7c15dcfa044dc4718f63d0905a5792cfbbbef6adfe82ac6bda4f04d81d56b250f202988a4aacbaf279669743622d55525c5eaab17a2f4af9da7445879f1f4ee004dca6d53c66fbeb74d980b445072d30b5ac8fd9836ca3a703ad89cd9a55718b9e3d2ed13fcf091cf2801b34543c76dc2ed9339c2af81b6fb9e0bfb96af1da73481992dbcea3ed98f105712c714ba0dea554257be1404b7650ae121dca648a"}, @op={0x18, 0x117, 0x3, 0x1}], 0x108}, 0x0) sendto(r2, &(0x7f0000000140)="ef00fffff7ba09000000000008006a3f99f2179f3bf02de9e6c0ab2fa5a4f0acd00e06d9052a673d7e9ca737eb889792e8ee852bb83705b6dc33250a8d0e973f7f1def197c6a0ad954fae54120736c03b1cb0e9f2bd69aed8359561bbad2347763f64d5a57c054a93f5aea9a1905c3e78530d89c367c9453ae2e65df8774b60b800e44", 0x83, 0x0, &(0x7f000007b000)=@can={0x1d}, 0x10) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0xfffffffffffffffe) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) recvmsg(r2, &(0x7f0000d43000)={&(0x7f000076c000)=@hci, 0xc, &(0x7f0000ae0fc0)=[{&(0x7f0000b9ff8b)=""/117, 0x75}], 0x1, &(0x7f0000837f57)=""/169, 0xa9}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f00000000c0)={0x20}, 0x1) setsockopt$inet_dccp_int(r3, 0x21, 0xb, &(0x7f0000000340)=0x40, 0x4) [ 235.230728] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x7d) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000003000000000000000000000095000000eeffffffda9c0ee9e21f0c8d97de3206fb1bed75ec4aa89687ae8b2323d8f3de6efba2ac8eac7d0bb3e550437a11de0d69fc040aa5e853da"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000640)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000fc0)={r0, r1}) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)="e3f58fa90700", 0x6}], 0x1, &(0x7f0000000000)}, 0x0) dup2(r0, r2) 2018/04/13 09:11:39 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x3201, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:39 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000000180)=0xd) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000ffc)='$\x00', 0x0) write(r0, &(0x7f0000000040)="15", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) umount2(&(0x7f0000001000)='./file0\x00', 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xffffffff, 0x141000) [ 235.336918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:39 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:39 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000d4eff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000a1cfe0)={0x14, 0x7, 0xa, 0x1}, 0x14}, 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setfsgid(r2) getsockname(r0, &(0x7f0000000140), &(0x7f00000001c0)=0x80) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000100)={0xd, 0x3ff, 0x80, 0x6}) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) 2018/04/13 09:11:39 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x3201, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x7d) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000003000000000000000000000095000000eeffffffda9c0ee9e21f0c8d97de3206fb1bed75ec4aa89687ae8b2323d8f3de6efba2ac8eac7d0bb3e550437a11de0d69fc040aa5e853da"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000640)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000fc0)={r0, r1}) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)="e3f58fa90700", 0x6}], 0x1, &(0x7f0000000000)}, 0x0) dup2(r0, r2) 2018/04/13 09:11:39 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000180)="0ee191b167aac03b59126602aa6d3bfa096143538155a88cab154c2c57244c3c0c8cfe84bea8fa0f3da20072be5c82561fdc1bf8a0a97bb4bffb0639154f72b5ad3b7e9796da13836cacfa7532dc034c57a92b76172fb734650af006139367e8aa56beded4a21ad2bcd40ae0a604fa5399c801f0278c93ad947f9c0511e6265dc8e095e26d6a0fdb62cd7f73f71113d1ad5eaf1b51ca82954a0847415dffa72617b8c487c4dde1a0cf19ebaf96951f6221edbde23fbc18d5b315d97eddcf26910ce5de761a1aa1255549d1a48c"}, 0x10) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000280)={@rand_addr=0x5acb5827, @rand_addr}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000100)) 2018/04/13 09:11:39 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000000180)=0xd) ioctl$KVM_RUN(r5, 0xae80, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:39 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c2fcee1f208ba4d4b8db03f2addffdaf349f5a9b8ca4bf627f2b82a9a21c98998eee5ce04f26aa5bbcc02cb3ef158c6c3f73970e28de30b3381104f5d9c4c1e329fd58e97091a7faf8a859bb03c2889bff32f5ecd630f0df7f57612bf6b408971fcf2ed3e168d8614830c8a7f6c1e03cac53867d2e37987f8b513d24b83"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:39 executing program 7: 2018/04/13 09:11:39 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x260, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, &(0x7f0000000040), &(0x7f0000000480)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'tunl0\x00', 'ipddp0\x00', 'sit0\x00', 'vlan0\x00', @random="5f79d473691b", [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x9, "11e68214ab993adcb2fd733288ada103d761b825c4dca004298ca0ed5290"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'syz_tun\x00', 'bcsf0\x00', 'bpq0\x00', '\x00', @random="ff9b3d5f7473", [], @empty, [], 0xa0, 0xd8, 0x110, [@cgroup0={'cgroup\x00', 0x8}]}, [@common=@mark={'mark\x00', 0x10}]}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x2d8) r1 = getpgid(0xffffffffffffffff) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x3f, 0x1000, r1}) 2018/04/13 09:11:39 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40200, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x8, 0x7fffffff}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x8, {{0x2, 0x4e20, @loopback=0x7f000001}}}, 0x90) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x5, 0x20}, 0x46}, 0x10) mprotect(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x1) getsockopt$inet_buf(r0, 0x0, 0x32, &(0x7f0000000080), &(0x7f00000000c0)) 2018/04/13 09:11:39 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x3201, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 236.058870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:39 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000140)={0x5, 0x6, 0x6, 0x1, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}]}) pread64(r0, &(0x7f0000000500)=""/15, 0xf, 0x0) add_key$user(&(0x7f0000c24ffb)='user\x00', &(0x7f00003ebffb)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000d6c000)="0000000000000001e3a255ec4a8d9d652d0536c67b9695cfb4c29da627ab9e5e0587e50ec159997396abc344a7d9f563a3e3af2d90a5dfcade859e4717cdf8f03fdf022186424d68996f51a7b3f20108f152bfd57ac5a50be84a106249d0216d5c98c41df97cd7d5032e9c632e4715a226907aabbfc5b3f2e96bf3039474801053b87fbf8674e100", 0x88, r2) r4 = add_key$user(&(0x7f0000ef5000)='user\x00', &(0x7f00008fa000)={0x73, 0x79, 0x7a}, &(0x7f0000537ffd)="0003", 0x2, r2) umount2(&(0x7f00000004c0)='./file0\x00', 0x4) r5 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)="b33ab76079ebe0d14f729cd653e520d29ad7ef0000000000000044c249b544230b9387fb8bd6ed266ccf59ef70995bf2e8e2ecd3fff32853747eda22d2818d08ca27e0ec821620e365a0e6b9485f2d925493f62113e33e5f8c7eba67fc19a9497f5b07e5849d2e875b0687d6401d36616fe0f3c3002801b4627ee7597689525e8e81f750a86eb580fb46c1523b8a25e71690ea52246bd3d32b1a91f944edb74b1f50ae08c5387ed8fd0598b600579f3af3f864e1c324f6928f6672f98f7e149bd61bd78b506e8bd71824cec9a8db26823cdd5259e688752d5491bd542b2ca7d08bdb777695db99f0401294aca81ab60da1240088cff9a340e1d6a89e7b09cfd51d", 0x101, r2) r6 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000626000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000dde000)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r4, r5, r6}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) 2018/04/13 09:11:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='pids.current\x00', 0x0, 0x0) read(r1, &(0x7f0000000380)=""/178, 0xb2) 2018/04/13 09:11:39 executing program 7: r0 = socket$inet_smc(0x2b, 0x1, 0x0) write(r0, &(0x7f0000000000)="6727a1339995510c022cffed998794f1b386a1949e6298aca9e3366446eeb9400ead922535897a1822a6ec83cdf0d07a371122a555c72982db15d34caa934879155d59c22fc4d4a0a90df6e7e1849ef04e9cde0130b06851e6d13c10fd2b9b740837c039e2bdfa0d4c06af8012f4ab7c5a45ca59cfbb2bf078652491ce49fad6ce84512c3ac9ee3539b14c5fca7da0b864e069d01b2cff18b3bd03be8ac1251e91e640d04404c1dfb86ee5136cdf41e7314568f90ed50eba16c67e", 0xbb) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000100), 0x4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x9}, 0x8) [ 236.179762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:40 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:40 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cuse\x00', 0x40000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000005c0)={{0xa, 0x4e22, 0x3, @loopback={0x0, 0x1}, 0x1}, {0xa, 0x4e21, 0xff, @mcast1={0xff, 0x1, [], 0x1}, 0xb160}, 0x1, [0x0, 0x8000, 0x5f5d, 0x100000001, 0x2, 0x5, 0x7, 0x6]}, 0x5c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) sendto$unix(r2, &(0x7f0000000400)="bde049e0682b57d141416d389c571e8262d916a0b1421efbec633e960391edcaab6778acd6d6abb432b9993edfc0ffe5ce71e0edcc1db36943c145e624d1c0e55ba0451ce6c493240a39cfa01af19b05831772740ccc313e669aedb7e5b9bb74933143c94a533bca65cac7f0fabdc9a53a6b6dc915a5c45b3cf666b14cd5035eeb9a063d309d1625f1449d6167a9cc3b25f4db7173d633aca21b8b68e2d8ee1e0858430b4c959bc9c0a8adf653dc0075396427f36620d079fde6d51b9678e1bcc75d69f5c5f1c0e153c932ffd80c9ef9fdf1d794c12b45759529b63d3f511ce7a20dc9aa29361c74530adf4086e17078fbe311430c2278d7d5", 0xf9, 0x4891, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0x6e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x78, r5, 0x102, 0x70bd27, 0x25dfdbfd, {0x11}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x8000) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r6 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r6, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:40 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)={@ipv4={[], [], @broadcast}}, &(0x7f0000000180)=0xd) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:40 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:40 executing program 5: mprotect(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x0, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000affff8)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000008000/0x4000)=nil, 0x4000, 0xd) recvmmsg(r1, &(0x7f0000001740)=[{{&(0x7f0000000040)=@alg, 0x330, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/207, 0xcf}], 0x1, &(0x7f0000000200)=""/85, 0xfffffffffffffe02}}, {{&(0x7f0000000280)=@ipx, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)=""/4096, 0xfffffd3c}], 0x1, &(0x7f00000016c0)=""/70, 0x46}}], 0x2, 0x0, 0x0) writev(r2, &(0x7f0000ff9ff0)=[{&(0x7f00003fb000), 0xffffff8b}], 0x1) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0xdae4, 0x20000) r3 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f00000013c0)={{0x8, 0x7, 0x5, 0x5, "9b2ce90b41792f687fda83eb71e991fea6affde45453d465bf93fc32ebc438e05fba0b372955bb267b83474d", 0x1ff}, 0x0, 0x0, 0x2, r3, 0x7, 0x3f1, "f76f45da911bbdda82045acb9bf4d73211ac80edd6f77d88bc293dde6491381d41b7012f9acf67a8bc6cc4a6ad0cd0ff3394f15cee554efcfc56596a19ecf978", &(0x7f0000001380)='/dev/dsp\x00', 0x9, [], [0x7ff, 0x100000001, 0x5, 0x3ff]}) 2018/04/13 09:11:40 executing program 4: r0 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e22, @rand_addr=0x3}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000000c0)="256425801a08ccfda10000000005d004") 2018/04/13 09:11:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000200)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) modify_ldt$read(0x0, &(0x7f0000000080)=""/183, 0xb7) r1 = syz_open_dev$evdev(&(0x7f0000237fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000aefffc)=0x7) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x8, 0x200000) unlinkat(r2, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x72db4346) 2018/04/13 09:11:40 executing program 7: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x8, 0x44000) r0 = syz_open_dev$sg(&(0x7f0000320ff8)='/dev/sg#\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x5382, 0x0) 2018/04/13 09:11:40 executing program 1 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 237.125580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:40 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) readv(r0, &(0x7f0000001280)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1) alarm(0x1000000000007) r1 = open(&(0x7f00003b6ff8)='./file0\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000887ff8)='./file1\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00009ac000)={0xfffffffffffffffd}, &(0x7f0000de0ff0), &(0x7f0000039ff0)={0x0, 0x8000000}, 0x8) fcntl$setsig(r1, 0xa, 0xe) creat(&(0x7f0000fdeff8)='./file1\x00', 0x0) fcntl$addseals(r0, 0x409, 0x8) 2018/04/13 09:11:40 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r0, r0) sendmsg$nl_xfrm(r0, &(0x7f0000fb9fc8)={&(0x7f0000397ff4)={0x10}, 0xc, &(0x7f0000fe8000)={&(0x7f0000000000)=ANY=[@ANYBLOB="f00000001a00090affffffffffffffffac140000000000000000000000000000ac14ffaa00000000000000000000000000000000000000000000907e018c2d974ea8b224287562000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffffac14ffaaffffffff3c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffff020000000000000000000000"], 0xf0}, 0x1}, 0x0) [ 237.210062] FAULT_INJECTION: forcing a failure. [ 237.210062] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 237.221995] CPU: 1 PID: 16052 Comm: syz-executor1 Not tainted 4.16.0+ #2 [ 237.228841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.238202] Call Trace: [ 237.240808] dump_stack+0x1b9/0x294 [ 237.244457] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.249657] ? __lock_acquire+0x7f5/0x5130 [ 237.253988] should_fail.cold.4+0xa/0x1a [ 237.258064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.263174] ? debug_check_no_locks_freed+0x310/0x310 [ 237.268372] ? check_noncircular+0x20/0x20 [ 237.272615] ? __lock_acquire+0x7f5/0x5130 [ 237.276853] ? print_usage_bug+0xc0/0xc0 [ 237.280944] ? __save_stack_trace+0x7e/0xd0 [ 237.285279] ? debug_check_no_locks_freed+0x310/0x310 [ 237.290471] ? print_usage_bug+0xc0/0xc0 [ 237.294540] ? mark_held_locks+0xc9/0x160 [ 237.298689] __alloc_pages_nodemask+0x34e/0xd70 [ 237.303356] ? print_usage_bug+0xc0/0xc0 [ 237.307399] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 237.312401] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 237.317410] ? retint_kernel+0x10/0x10 [ 237.321282] ? lock_acquire+0x1dc/0x520 [ 237.325240] ? graph_lock+0x170/0x170 [ 237.329025] ? __lock_acquire+0x7f5/0x5130 [ 237.333253] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 237.338774] alloc_pages_current+0x10c/0x210 [ 237.343166] skb_page_frag_refill+0x453/0x6a0 [ 237.347642] ? sock_kfree_s+0x60/0x60 [ 237.351429] ? kasan_check_read+0x11/0x20 [ 237.355559] ? rcu_is_watching+0x85/0x140 [ 237.359690] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 237.364869] tun_build_skb.isra.51+0x348/0x1dc0 [ 237.369537] ? tun_device_event+0x1020/0x1020 [ 237.374022] ? retint_kernel+0x10/0x10 [ 237.377895] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 237.382898] ? print_usage_bug+0xc0/0xc0 [ 237.386940] ? graph_lock+0x170/0x170 [ 237.390723] ? retint_kernel+0x10/0x10 [ 237.394596] ? reacquire_held_locks+0xbc/0x3e0 [ 237.399161] ? print_usage_bug+0xc0/0xc0 [ 237.403206] ? print_usage_bug+0xc0/0xc0 [ 237.407251] ? print_usage_bug+0xc0/0xc0 [ 237.411294] ? print_usage_bug+0xc0/0xc0 [ 237.415339] ? __lock_acquire+0x7f5/0x5130 [ 237.419557] ? debug_check_no_locks_freed+0x310/0x310 [ 237.424731] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 237.429901] ? print_usage_bug+0xc0/0xc0 [ 237.433946] ? debug_check_no_locks_freed+0x310/0x310 [ 237.439116] ? __lock_acquire+0x7f5/0x5130 [ 237.443342] tun_get_user+0xc04/0x4100 [ 237.447212] ? debug_check_no_locks_freed+0x310/0x310 [ 237.452399] ? debug_check_no_locks_freed+0x310/0x310 [ 237.457572] ? tun_build_skb.isra.51+0x1dc0/0x1dc0 [ 237.462482] ? graph_lock+0x170/0x170 [ 237.466351] ? graph_lock+0x170/0x170 [ 237.470134] ? lock_acquire+0x1dc/0x520 [ 237.474089] ? __fdget_pos+0x1a9/0x1e0 [ 237.477959] ? find_held_lock+0x36/0x1c0 [ 237.482011] ? lock_downgrade+0x8e0/0x8e0 [ 237.486148] ? kasan_check_read+0x11/0x20 [ 237.490364] ? rcu_is_watching+0x85/0x140 [ 237.494499] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 237.499675] ? tun_get+0x22b/0x360 [ 237.503196] ? tun_chr_close+0x180/0x180 [ 237.507244] tun_chr_write_iter+0xb9/0x154 [ 237.511465] do_iter_readv_writev+0x6a0/0x970 [ 237.516035] ? vfs_dedupe_file_range+0xa00/0xa00 [ 237.520778] ? rw_verify_area+0x118/0x360 [ 237.524910] do_iter_write+0x185/0x5f0 [ 237.528786] vfs_writev+0x1c7/0x330 [ 237.532395] ? vfs_iter_write+0xb0/0xb0 [ 237.536354] ? wait_for_completion+0x870/0x870 [ 237.540927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.546445] ? __fdget_pos+0xd6/0x1e0 [ 237.550227] ? __fdget_raw+0x20/0x20 [ 237.553921] ? __sb_end_write+0xac/0xe0 [ 237.557885] do_writev+0x112/0x2f0 [ 237.561411] ? vfs_writev+0x330/0x330 [ 237.565193] ? mm_fault_error+0x380/0x380 [ 237.569326] ? ksys_ioctl+0x81/0xd0 [ 237.572936] SyS_writev+0x27/0x30 [ 237.576372] ? SyS_readv+0x30/0x30 [ 237.579896] do_syscall_64+0x29e/0x9d0 [ 237.583765] ? vmalloc_sync_all+0x30/0x30 [ 237.587895] ? finish_task_switch+0x1ca/0x810 [ 237.592373] ? syscall_return_slowpath+0x5c0/0x5c0 [ 237.597288] ? syscall_return_slowpath+0x30f/0x5c0 [ 237.602201] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 237.607549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.612378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 237.617548] RIP: 0033:0x4551d1 [ 237.620720] RSP: 002b:00007f4a3765fba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 237.628412] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 00000000004551d1 [ 237.635701] RDX: 0000000000000001 RSI: 00007f4a3765fbf0 RDI: 00000000000000fc [ 237.642950] RBP: 0000000020007000 R08: 00000000000000fc R09: 0000000000000000 [ 237.650200] R10: 0000000000000036 R11: 0000000000000293 R12: 0000000000000013 2018/04/13 09:11:40 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="b310e836", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r1}, &(0x7f0000000200)=0xc) 2018/04/13 09:11:41 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:41 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000040)="440f20c0350e000000440f22c0260f013ab805000000b9078000000f01d9b9321001c0b802000000ba000000000f30c744240000f0d9e8c744240204000000c7442406000000000f011424c4227d0ff70f353e660f38814d0ac4e27d8c07668ec5", 0x61}], 0x1, 0x68, &(0x7f0000000000), 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:41 executing program 3: pipe(&(0x7f0000055000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r0, 0x5}, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) tee(r0, r1, 0x5, 0x0) [ 237.657450] R13: 0000000000000658 R14: 00000000006fc8e0 R15: 0000000000000000 2018/04/13 09:11:41 executing program 1 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 237.712404] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:11:41 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socketpair(0x2, 0x80000, 0x4, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x10000, 0x4) bind$alg(r0, &(0x7f0000000800)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) r3 = socket(0xf, 0x807, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000480)={r4, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}, [0x9, 0x2, 0x7fffffff, 0xf4b, 0x81, 0x3, 0x3, 0x401, 0xc71, 0x1f, 0x1f4f, 0xffffffff7fffffff, 0x4, 0x2, 0x9]}, &(0x7f0000000380)=0x100) sendmsg$alg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000440)="9558a787d645e075ab133b648ce8f6d8362aaca1e94a4a19076ab7b78aab191292", 0x21}], 0x1, &(0x7f0000000500)}, 0x0) syncfs(r2) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x111000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x57, "29e4601b129aa0f64d83f13d2bb8cb35e4320a0b616a9c37b96048b39b228f03218fe4a6946441ca3f503de86d40366beb2dd1e46b351faa75993579bd45b24b07a111c1f1f210158cd29bea4063eacc349233aaa224be"}, &(0x7f0000000200)=0x5f) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f0000000240)={r6, 0xa2, "d367f583d24eab9fd4606037b35e6ff877066c48dd5d38ab3f2e31532f08de7164a641fc331572f24bb1f374c91803162f2881c016161fc9831192ce4c7dd4de7d896683efce10b1ba7c2e9d22fa3034bc38d95c219b28629518646fcfeea940394d94fbc826eb084e13811a9d855e0a888152ee1aa203338a7787d3f088a9d42f861842682e13d1bbac91078246f2c597f854cb3191ff392cd90f29502a67bf80e7"}, &(0x7f0000000300)=0xaa) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000001b40)=0xe8) recvmsg$netrom(r5, &(0x7f00000007c0)={&(0x7f00000003c0)=@full={{0x3, {"e15d6fbbb289e6"}, 0x3f}, [{"d593f5fa1a2580"}, {"218b5e51640034"}, {"ba8abdb3b00a24"}, {"ff428190ee77fa"}, {"6014bd0dc7750f"}, {"7b2a1a5cba3a99"}, {"a2b3a1ef2c50cc"}, {"de90bc68fa1235"}]}, 0x48, &(0x7f0000000780)=[{&(0x7f0000000580)="f435fb38b53281aea7258ae66e93a5cf8428b86592b0f2f3961ae449fb2771e73507af824ee81691fa992dd0727149319d8e81f3cd2ce6fcf9c00bce639e4a45efb9334fcb699c8bc5a4821cc73a2730a33445d705b01963189e8c1bae1d0d2a7f7152e66eb19132be7de2fcf7c84033482686bac920d01d92ad1f4893baa94000b07117e796501bc1ba3a1881df2ccd4098039c2424c5a9abdaaaee8efb1b6ee923e062bb429004a3f0b2876423b581d4d238d3b6a016350f6c7925dea21faf78a4df73cff9a209b51f3ff09c0f0be02fd2667a9dee47f68c0c2cbfc9567218a7f160dc213a008e38", 0xe9}, {&(0x7f0000000680)="e4f8cfc323be385e018824e43c8d8844fccad63e1876004154bf515064a9fed028260614ed7afcb7412b7bc97a0272561ce5a7c07edead79e3cc5231da4a64eab0e77b24a5ad3b50b7ab0c5a9e3f6247103f89d665ba8514122ef77fbd03945a596ef8b50b47a40eb5ede9ef8a38a5b9b2a84a93468a0946be53251c64e4d794a4678dfb57814d22479fe2ccc6cd37c66fe50d53341445a62eae88edd85d2b2d8b88ce48f8d719c17a6bbfc0d20eda61e55a0beefcd14d5e63789fd023ff5b9c9a2ad40f58a1251cf8be7443c93454e0d9b6d67ae8f7790e8608eaf2", 0xdc}], 0x2, &(0x7f0000000880)=[{0x98, 0x11f, 0x4, "c4d9707ff57f4809f06d306d8892c8402cd9c21d627c9c090e43c901ce30087e9df40daa4c0d4ec7b020927aebe8e895b2909f9c471d9868bc13ac6cfa5b79409fedb5cb8a2f798a074932fa6871cce82e798527134afae5ea420ecc2573ab0ef691ee0771b225f7b8416729666b136546f4c79929eac3e07803b5869b91330c883b25"}, {0xa8, 0x10c, 0x29a, "afc38b27454d19186e436fd96f4618b27fc82190ccd974315e30cf702fb574c660fb0839e02f3ef0c29639745a9485e79869fa902ad31438b10b698de3074b857691f6281f823c9131162564149203e9c18c764bb837ff8fc9f40c8aa94fa601471651d8a1f60ac20e7e34d7a6d808850f8ad35f5b45b3005ad2fb3269429f8594aa97775f74d731063409acb78de9d7b36d0bf177b8"}, {0x48, 0x1bd, 0x0, "b130044985f3cb4da188fecbc1fd18c226bfb71734b88bdfca541c49550df4bb263f856b361b9975065f13debb86b2e7dca1"}, {0x1010, 0x11, 0x9, "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"}], 0x1198, 0x40005}, 0x1) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000000)={r7, 0x1f, 0xffff, 0x13, 0x7, 0x6}, &(0x7f0000000080)=0x14) [ 237.825999] FAULT_INJECTION: forcing a failure. [ 237.825999] name failslab, interval 1, probability 0, space 0, times 0 [ 237.837415] CPU: 0 PID: 16082 Comm: syz-executor1 Not tainted 4.16.0+ #2 [ 237.844257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.853613] Call Trace: [ 237.856213] dump_stack+0x1b9/0x294 [ 237.859857] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.865053] ? debug_check_no_locks_freed+0x310/0x310 [ 237.870259] should_fail.cold.4+0xa/0x1a [ 237.874341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.879463] ? debug_check_no_locks_freed+0x310/0x310 [ 237.884657] ? rcu_pm_notify+0xc0/0xc0 [ 237.888552] ? print_usage_bug+0xc0/0xc0 [ 237.892627] ? rcu_read_lock_sched_held+0x108/0x120 [ 237.897647] ? __alloc_pages_nodemask+0xacf/0xd70 [ 237.902495] ? graph_lock+0x170/0x170 [ 237.906294] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 237.911301] ? __lock_acquire+0x7f5/0x5130 [ 237.915533] ? find_held_lock+0x36/0x1c0 [ 237.919594] __should_failslab+0x124/0x180 [ 237.923811] should_failslab+0x9/0x14 [ 237.927612] kmem_cache_alloc+0x47/0x760 [ 237.931673] __build_skb+0xa3/0x410 [ 237.935295] ? skb_try_coalesce+0x1c70/0x1c70 [ 237.939788] ? graph_lock+0x170/0x170 [ 237.943593] ? lock_acquire+0x1dc/0x520 [ 237.947584] ? tun_build_skb.isra.51+0x5b1/0x1dc0 [ 237.952422] build_skb+0x6f/0x2e0 [ 237.955868] ? __build_skb+0x410/0x410 [ 237.959766] tun_build_skb.isra.51+0x8df/0x1dc0 [ 237.964446] ? tun_device_event+0x1020/0x1020 [ 237.968950] ? lock_acquire+0x1dc/0x520 [ 237.972934] ? alloc_set_pte+0x1077/0x16a0 [ 237.977171] ? print_usage_bug+0xc0/0xc0 [ 237.981239] ? graph_lock+0x170/0x170 [ 237.985043] ? lock_release+0xa10/0xa10 [ 237.989027] ? reacquire_held_locks+0xbc/0x3e0 [ 237.993617] ? print_usage_bug+0xc0/0xc0 [ 237.997688] ? print_usage_bug+0xc0/0xc0 [ 238.001753] ? print_usage_bug+0xc0/0xc0 [ 238.005813] ? print_usage_bug+0xc0/0xc0 [ 238.009873] ? __lock_acquire+0x7f5/0x5130 [ 238.014111] ? debug_check_no_locks_freed+0x310/0x310 [ 238.019302] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 238.024502] ? print_usage_bug+0xc0/0xc0 [ 238.028571] ? debug_check_no_locks_freed+0x310/0x310 [ 238.033752] ? __lock_acquire+0x7f5/0x5130 [ 238.037994] tun_get_user+0xc04/0x4100 [ 238.041871] ? debug_check_no_locks_freed+0x310/0x310 [ 238.047063] ? debug_check_no_locks_freed+0x310/0x310 [ 238.052258] ? tun_build_skb.isra.51+0x1dc0/0x1dc0 [ 238.057172] ? graph_lock+0x170/0x170 [ 238.060965] ? graph_lock+0x170/0x170 [ 238.064755] ? lock_acquire+0x1dc/0x520 [ 238.068721] ? __fdget_pos+0x1a9/0x1e0 [ 238.072595] ? find_held_lock+0x36/0x1c0 [ 238.076654] ? lock_downgrade+0x8e0/0x8e0 [ 238.080800] ? kasan_check_read+0x11/0x20 [ 238.084949] ? rcu_is_watching+0x85/0x140 [ 238.089099] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 238.094290] ? tun_get+0x22b/0x360 [ 238.097822] ? tun_chr_close+0x180/0x180 [ 238.101874] tun_chr_write_iter+0xb9/0x154 [ 238.106094] do_iter_readv_writev+0x6a0/0x970 [ 238.110584] ? vfs_dedupe_file_range+0xa00/0xa00 [ 238.115350] ? rw_verify_area+0x118/0x360 [ 238.119506] do_iter_write+0x185/0x5f0 [ 238.123386] ? dup_iter+0x270/0x270 [ 238.127001] vfs_writev+0x1c7/0x330 [ 238.130636] ? vfs_iter_write+0xb0/0xb0 [ 238.134613] ? wait_for_completion+0x870/0x870 [ 238.139191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.144709] ? __fdget_pos+0xd6/0x1e0 [ 238.148492] ? __fdget_raw+0x20/0x20 [ 238.152185] ? __sb_end_write+0xac/0xe0 [ 238.156149] do_writev+0x112/0x2f0 [ 238.159685] ? vfs_writev+0x330/0x330 [ 238.163485] ? mm_fault_error+0x380/0x380 [ 238.167628] ? ksys_ioctl+0x81/0xd0 [ 238.171248] SyS_writev+0x27/0x30 [ 238.174680] ? SyS_readv+0x30/0x30 [ 238.178205] do_syscall_64+0x29e/0x9d0 [ 238.182070] ? vmalloc_sync_all+0x30/0x30 [ 238.186201] ? _raw_spin_unlock_irq+0x27/0x70 [ 238.190676] ? finish_task_switch+0x1ca/0x810 [ 238.195163] ? syscall_return_slowpath+0x5c0/0x5c0 [ 238.200085] ? syscall_return_slowpath+0x30f/0x5c0 [ 238.204999] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 238.210351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 238.215176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 238.220346] RIP: 0033:0x4551d1 [ 238.223512] RSP: 002b:00007f4a3765fba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 238.231206] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 00000000004551d1 [ 238.238471] RDX: 0000000000000001 RSI: 00007f4a3765fbf0 RDI: 00000000000000fc [ 238.245735] RBP: 0000000020007000 R08: 00000000000000fc R09: 0000000000000000 [ 238.253797] R10: 0000000000000036 R11: 0000000000000293 R12: 0000000000000013 [ 238.261065] R13: 0000000000000658 R14: 00000000006fc8e0 R15: 0000000000000001 2018/04/13 09:11:58 executing program 7: socketpair(0x8000000000001e, 0x805, 0x0, &(0x7f0000d24ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000100)=ANY=[@ANYBLOB="0200000002d6edcdf7c169ae9af8238c"], 0xa2f1}, 0x1}, 0x0) close(r1) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x698, 0x40000) recvmsg(r0, &(0x7f00000000c0)={&(0x7f00004afff8)=@sco, 0x8, &(0x7f000020ff70)=[{&(0x7f0000359f45)=""/187, 0xbb}], 0x1, &(0x7f00002d0000)=""/4096, 0xffffffffffffff02}, 0x0) 2018/04/13 09:11:58 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:58 executing program 3: syz_emit_ethernet(0x271, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x223, 0x21, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x10b, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)={0x0, 0x2, [0xb18, 0x8a3, 0x9ac, 0xcab]}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000300)={0x7, 0x400, [{0x1, 0x0, 0x7}, {0x4, 0x0, 0x9}, {0x3, 0x0, 0x6}, {0x6ca0, 0x0, 0x6}, {0x1, 0x0, 0x27a}, {0x0, 0x0, 0x10000}, {0x0, 0x0, 0x2}]}) ioctl$VT_DISALLOCATE(r0, 0x5608) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000044c0)={{{@in6=@local, @in6=@local}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000045c0)=0xe8) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000380)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000003c0)={r1, r2}) 2018/04/13 09:11:58 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) accept4$inet6(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000000440)=0x1c, 0x80800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000003c0)='bic\x00', 0x4) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:58 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:58 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000003c0)=""/246) getsockname$inet6(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @ipv4}, &(0x7f0000000100)=0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000000)={0x80000001, 0x400, 0x59, 'queue1\x00', 0x7}) ioctl$PPPIOCSFLAGS(r0, 0x4004743b, &(0x7f0000e9f000)) 2018/04/13 09:11:58 executing program 1 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000004000)='map_files\x00') renameat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') write$eventfd(r0, &(0x7f00000001c0)=0x17ae, 0x8) renameat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000280)={@dev, @remote, 0x0}, &(0x7f00000002c0)=0xc) connect(r0, &(0x7f0000000300)=@hci={0x1f, r1, 0x3}, 0x80) getdents(r0, &(0x7f0000000580)=""/407, 0x197) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000180)={0x3, 0x1c, [0x101, 0x38000000000000, 0x4, 0x7ff, 0x101, 0x9, 0x5]}) getdents(r0, &(0x7f0000000000)=""/198, 0xc6) [ 254.964071] FAULT_INJECTION: forcing a failure. [ 254.964071] name failslab, interval 1, probability 0, space 0, times 0 [ 254.975312] CPU: 1 PID: 16126 Comm: syz-executor1 Not tainted 4.16.0+ #2 [ 254.982129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.991459] Call Trace: [ 254.994030] dump_stack+0x1b9/0x294 [ 254.997639] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.002809] ? lock_downgrade+0x8e0/0x8e0 [ 255.006943] should_fail.cold.4+0xa/0x1a [ 255.010990] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.011642] dccp_v6_rcv: dropped packet with invalid checksum [ 255.016168] ? __fib_validate_source+0xe15/0x1e70 [ 255.016178] ? __lock_acquire+0x7f5/0x5130 [ 255.016191] ? inet_dump_fib+0x840/0x840 [ 255.016199] ? __lock_acquire+0x7f5/0x5130 [ 255.016208] ? graph_lock+0x170/0x170 [ 255.016221] ? print_usage_bug+0xc0/0xc0 [ 255.047184] ? __lock_acquire+0x7f5/0x5130 [ 255.051423] ? __lock_is_held+0xb5/0x140 [ 255.055478] __should_failslab+0x124/0x180 [ 255.059698] should_failslab+0x9/0x14 [ 255.063479] kmem_cache_alloc+0x47/0x760 [ 255.067527] ? ip_mc_drop_socket+0x270/0x270 [ 255.071916] ? print_usage_bug+0xc0/0xc0 [ 255.075965] dst_alloc+0xbb/0x1d0 [ 255.079403] rt_dst_alloc+0xfa/0x500 [ 255.083100] ? fnhe_flush_routes+0x460/0x460 [ 255.087487] ? fib_validate_source+0x34d/0x600 [ 255.092054] ? ip_mc_validate_source+0x261/0x2c0 [ 255.096791] ? ip_mc_validate_source+0x122/0x2c0 [ 255.101530] ip_route_input_rcu+0x503/0xd50 [ 255.105838] ? ip_route_input_slow+0x3dc0/0x3dc0 [ 255.110578] ? lock_acquire+0x1dc/0x520 [ 255.114534] ? ip_route_input_rcu+0xd50/0xd50 [ 255.119018] ? kasan_check_read+0x11/0x20 [ 255.123148] ? rcu_is_watching+0x85/0x140 [ 255.127278] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.132455] ? __local_bh_enable_ip+0x161/0x230 [ 255.137108] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 255.142627] ip_route_input_noref+0x122/0x250 [ 255.147105] ? ip_route_input_rcu+0xd50/0xd50 [ 255.151580] ? __lock_is_held+0xb5/0x140 [ 255.155627] ip_rcv_finish+0x3f5/0x2200 [ 255.159594] ? ip_local_deliver_finish+0xd80/0xd80 [ 255.164509] ? lock_downgrade+0x8e0/0x8e0 [ 255.168639] ? kasan_check_read+0x11/0x20 [ 255.172768] ? rcu_is_watching+0x85/0x140 [ 255.176898] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.182070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 255.187068] ? nf_hook_slow+0x11e/0x1c0 [ 255.191028] ip_rcv+0xb70/0x143d [ 255.195229] ? ip_local_deliver+0x720/0x720 [ 255.199534] ? kernel_text_address+0x79/0xf0 [ 255.203924] ? __kernel_text_address+0xd/0x40 [ 255.208408] ? ip_local_deliver_finish+0xd80/0xd80 [ 255.213318] ? ip_local_deliver+0x720/0x720 [ 255.217623] __netif_receive_skb_core+0x26f5/0x3630 [ 255.222627] ? nf_ingress+0xa00/0xa00 [ 255.226410] ? __lock_acquire+0x7f5/0x5130 [ 255.230630] ? __skb_flow_dissect+0xba1/0x45e0 [ 255.235194] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 255.240371] ? debug_check_no_locks_freed+0x310/0x310 [ 255.245547] ? skb_flow_dissect_tunnel_info+0xaa0/0xaa0 [ 255.250892] ? graph_lock+0x170/0x170 [ 255.254689] ? rcu_read_lock_sched_held+0x108/0x120 [ 255.259696] ? kmem_cache_alloc+0x5fa/0x760 [ 255.264007] ? find_held_lock+0x36/0x1c0 [ 255.268059] ? lock_downgrade+0x8e0/0x8e0 [ 255.272194] ? lock_downgrade+0x8e0/0x8e0 [ 255.276335] ? pvclock_read_flags+0x160/0x160 [ 255.280814] ? build_skb+0x1c7/0x2e0 [ 255.284519] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.289696] ? ktime_get_with_offset+0x395/0x4a0 [ 255.294438] ? lock_acquire+0x1dc/0x520 [ 255.298394] ? netif_receive_skb_internal+0xa2/0x7b0 [ 255.303483] ? kasan_check_read+0x11/0x20 [ 255.307610] ? rcu_is_watching+0x85/0x140 [ 255.311736] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.316909] __netif_receive_skb+0x2c/0x1e0 [ 255.321213] netif_receive_skb_internal+0x126/0x7b0 [ 255.326213] ? dev_cpu_dead+0xad0/0xad0 [ 255.330169] ? kasan_check_read+0x11/0x20 [ 255.334293] ? rcu_is_watching+0x85/0x140 [ 255.338422] ? rcu_pm_notify+0xc0/0xc0 [ 255.342301] netif_receive_skb+0xba/0x400 [ 255.346432] ? netif_receive_skb_internal+0x7b0/0x7b0 [ 255.351607] ? find_held_lock+0x36/0x1c0 [ 255.355660] ? tun_rx_batched.isra.53+0x494/0x8c0 [ 255.360488] tun_rx_batched.isra.53+0x4ba/0x8c0 [ 255.365141] ? tun_sock_write_space+0x390/0x390 [ 255.369792] ? kasan_check_read+0x11/0x20 [ 255.373923] ? rcu_is_watching+0x85/0x140 [ 255.378054] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.383237] tun_get_user+0x2bcc/0x4100 [ 255.387192] ? debug_check_no_locks_freed+0x310/0x310 [ 255.392372] ? debug_check_no_locks_freed+0x310/0x310 [ 255.397548] ? tun_build_skb.isra.51+0x1dc0/0x1dc0 [ 255.402455] ? graph_lock+0x170/0x170 [ 255.406254] ? graph_lock+0x170/0x170 [ 255.410036] ? lock_acquire+0x1dc/0x520 [ 255.413991] ? __fdget_pos+0x1a9/0x1e0 [ 255.417864] ? find_held_lock+0x36/0x1c0 [ 255.421929] ? kasan_check_read+0x11/0x20 [ 255.426061] ? rcu_is_watching+0x85/0x140 [ 255.430189] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 255.435367] ? tun_get+0x22b/0x360 [ 255.438890] ? tun_chr_close+0x180/0x180 [ 255.442944] tun_chr_write_iter+0xb9/0x154 [ 255.447163] do_iter_readv_writev+0x6a0/0x970 [ 255.451651] ? vfs_dedupe_file_range+0xa00/0xa00 [ 255.456393] ? rw_verify_area+0x118/0x360 [ 255.460524] do_iter_write+0x185/0x5f0 [ 255.464391] ? dup_iter+0x270/0x270 [ 255.468006] vfs_writev+0x1c7/0x330 [ 255.471616] ? vfs_iter_write+0xb0/0xb0 [ 255.475574] ? wait_for_completion+0x870/0x870 [ 255.480159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.485677] ? __fdget_pos+0xd6/0x1e0 [ 255.489456] ? __fdget_raw+0x20/0x20 [ 255.493150] ? __sb_end_write+0xac/0xe0 [ 255.497121] do_writev+0x112/0x2f0 [ 255.500647] ? vfs_writev+0x330/0x330 [ 255.504430] ? mm_fault_error+0x380/0x380 [ 255.508560] ? ksys_ioctl+0x81/0xd0 [ 255.512169] SyS_writev+0x27/0x30 [ 255.515603] ? SyS_readv+0x30/0x30 [ 255.519125] do_syscall_64+0x29e/0x9d0 [ 255.522994] ? vmalloc_sync_all+0x30/0x30 [ 255.527123] ? _raw_spin_unlock_irq+0x27/0x70 [ 255.531608] ? finish_task_switch+0x1ca/0x810 [ 255.536093] ? syscall_return_slowpath+0x5c0/0x5c0 [ 255.541004] ? syscall_return_slowpath+0x30f/0x5c0 [ 255.545920] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 255.551372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.556200] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 255.561372] RIP: 0033:0x4551d1 2018/04/13 09:11:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000384ff7)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000cf1ffc)=0x600210) pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000652ff8)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, r3, 0x8, 0x0) r4 = dup2(r2, r3) ioctl$int_in(r4, 0x5452, &(0x7f0000e35ff8)=0x45) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0xd6f, @local={0xfe, 0x80, [], 0xaa}, 0xffffffffffffff1b}], 0x1c) readv(r0, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/120, 0x78}], 0x1) r5 = getpgrp(0x0) fcntl$setown(r2, 0x8, r5) fcntl$setsig(r3, 0xa, 0x12) tkill(r5, 0x100000000000016) pwritev(r0, &(0x7f0000ed8f70)=[{&(0x7f00007d7f41)='k', 0x1}], 0x1, 0x0) 2018/04/13 09:11:58 executing program 7: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80001) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x4, 0x4, 0x4, 0x20, 0x0, 0xff, 0x10000, 0x8, 0x8, 0xa54e, 0xfffffffffffffbff, 0x3b, 0x3f, 0xdf, 0x7, 0x15, 0x4a, 0x100000000, 0x7fffffff, 0xe7, 0x9, 0x2, 0x8, 0x2, 0xdfe, 0x9a, 0x9, 0x0, 0x0, 0xfffffffffffff966, 0x1, 0x1, 0x80000001, 0x80, 0x8, 0x4, 0x0, 0x0, 0x2, @perf_config_ext={0x800, 0x1}, 0x11000, 0x1, 0x6, 0x1, 0x1ff, 0x11, 0x1}, r0, 0x10, r1, 0x2) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000040)='\x00', 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000080)={{0x2c, @multicast1=0xe0000001, 0x4e23, 0x0, 'lblcr\x00', 0x0, 0x80, 0xf}, {@rand_addr=0x3f, 0x4e20, 0x1, 0x4, 0x8, 0x1f}}, 0x44) unshare(0x60200) r3 = socket$nl_generic(0xa, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r4, 0x9}, 0x8) setsockopt$netlink_NETLINK_RX_RING(r3, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) setuid(r5) [ 255.564542] RSP: 002b:00007f4a3765fba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 255.572235] RAX: ffffffffffffffda RBX: 0000000000000036 RCX: 00000000004551d1 [ 255.579483] RDX: 0000000000000001 RSI: 00007f4a3765fbf0 RDI: 00000000000000fc [ 255.586744] RBP: 0000000020007000 R08: 00000000000000fc R09: 0000000000000000 [ 255.593996] R10: 0000000000000036 R11: 0000000000000293 R12: 0000000000000013 [ 255.601248] R13: 0000000000000658 R14: 00000000006fc8e0 R15: 0000000000000002 2018/04/13 09:11:59 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 255.615628] nla_parse: 1 callbacks suppressed [ 255.615634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 255.622910] dccp_v6_rcv: dropped packet with invalid checksum 2018/04/13 09:11:59 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) wait4(r0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x4, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) 2018/04/13 09:11:59 executing program 1 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x4e, &(0x7f0000000fff), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0xb5e0, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x17}}, 0x5}], 0x38) 2018/04/13 09:11:59 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='proc@+$wlan0ppp1em1\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0x0) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'sit0\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x402}) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @hyper}, 0xfffffefa) r2 = syz_open_dev$tun(&(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xb4, r3, 0x1, 0x70bd2a, 0x25dfdbff, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x80, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback=0x7f000001}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xdc}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x1000}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback=0x7f000001}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x12}}]}]}, 0xb4}, 0x1}, 0x10) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x20000000000002ac, &(0x7f0000000140)}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r4 = getpgrp(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000140)="2f6578650000001cf6f3") flistxattr(r5, &(0x7f0000000040)=""/26, 0x1a) ioctl$KVM_SET_PIT2(r5, 0x4070aea0, &(0x7f0000000200)={[{0x3f, 0x9, 0x800, 0x4, 0x7, 0xfc03, 0x2, 0x7fff, 0x8, 0xc000000000000000, 0x1, 0x9644, 0xfffffffffffffff7}, {0x200, 0x1, 0x6, 0xa961, 0xda, 0x77, 0x7578, 0xe5, 0x3, 0x1, 0x98d, 0x7fff, 0xc18}, {0x1, 0xa8d, 0x6, 0x3, 0x0, 0x5, 0x8, 0xfffffffffffffffc, 0xef, 0x9, 0xfffffffffffff001, 0x10001, 0x359}], 0x6}) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000080)=r5) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f00000000c0)={0x80000000, 0x1}) 2018/04/13 09:11:59 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 255.716640] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 255.761940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:11:59 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/81, 0x51) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000001c0)={{0x3, 0x3, 0x9, 0x0, 0x6}, 0x5}) 2018/04/13 09:11:59 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:59 executing program 3: perf_event_open(&(0x7f0000012000)={0x2, 0x78, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000b3d000)={0x0, 0x30, 0x0, @thr={&(0x7f000022f000), &(0x7f0000298000)}}, &(0x7f0000a7e000)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000d9efe0)={{0x0, 0x1c9c380}}, &(0x7f0000ef9fe0)) 2018/04/13 09:11:59 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:59 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:11:59 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000dff7)='/dev/rtc\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f00000011c0)=ANY=[], 0x0, &(0x7f0000001400)=[{&(0x7f0000002000)="5e9b6d6eda21aa4392a6823002d21dbb2eed093b9c", 0x15}], 0x1, &(0x7f0000001440)}, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000000)={"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"}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x4028700f, &(0x7f0000001ffc)) 2018/04/13 09:11:59 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) r4 = semget$private(0x0, 0x3, 0x90) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000400)=""/167) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000003c0)={0x0, 'ipddp0\x00', 0x4}, 0x18) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:11:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x6, 0x4, 0x400, 0x9, 0x81}) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) 2018/04/13 09:11:59 executing program 1: syz_emit_ethernet(0xfdef, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xffffffffffffffeb, "0b0ff2540c715e62dce42812619b3a979657b255595eca306969d2b61d4a00d0739a042abd075e45bbebb6517f09b0f1fb44ecf8b427c8f0c79fdd5537db5d2946e5207d25c6ea9d8662620287a67176d3d2148ff120fee0b4cdde95c3bad96ea834ac94de3f2cfe7af62c172992901006a6494005f3d7d50f240daf0f51e316f525dca0461b92185ea591e6bc93689bac55977ff82dd56494d5ec722adfa3603606bd32cc532b80fe79364ed26e02a770c5cb21f1b4ea26f2d9be2b4a18fcc66db2b36aa96cce1a34194ecc1a3d79d8034a8cd35b1c"}, &(0x7f0000000000)=0xfffffffffffffd28) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0xffffffffffffff45, 0x1f4, 0x0, 0xfffffffffffffe05) 2018/04/13 09:11:59 executing program 4: syz_open_dev$sg(&(0x7f0000000f00)='/dev/sg#\x00', 0x9, 0x105140) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/autofs\x00', 0x204180, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, 0xa795, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) r2 = socket$inet(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x400, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000008c0)=@broute={'broute\x00', 0x20, 0x2, 0x3e8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6tnl0\x00', 'syz_tun\x00', @link_local={0x1, 0x80, 0xc2}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0x108, 0x158}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x10000, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0xd, 0x0, 0x86dd, 'syzkaller0\x00', 'tunl0\x00', 'sit0\x00', 'ifb0\x00', @empty, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x130, 0x1b0, 0x200, [@ip6={'ip6\x00', 0x50, {{@empty, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, @limit={'limit\x00', 0x20, {{0x0, 0xec}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz1\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}]}, 0x460) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x4, 0x4b8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x0, &(0x7f0000000680), &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x28, 0x88e5, 'ip6tnl0\x00', 'ip6tnl0\x00', 'rose0\x00', 'teql0\x00', @random="d690e893040b", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x21}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xe0, 0x130, 0x168, [@cpu={'cpu\x00', 0x8, {{0x10000}}}, @quota={'quota\x00', 0x18, {{0x1, 0x0, 0x65, 0x5}}}]}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x6, 'syz1\x00', 0x100000001}}}]}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x11, 0x4, 0x88fe, 'team_slave_0\x00', 'team0\x00', '\x00', '\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0xa8, 0xd8}, [@common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffc}}}]}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}, {{{0x0, 0x4, 0x898e, '\x00', 'vcan0\x00', 'gre0\x00', '\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x12}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xf8, 0xf8, 0x130, [@nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x5}}}, @mac={'mac\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@random="44090ba147aa", 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x1, [{{{0x19, 0x8, 0x16, 'teql0\x00', 'bond_slave_1\x00', 'lo\x00', 'bcsh0\x00', @random="af93db15370b", [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"a30a73a96fbbf865ec68a81e8432feb7cf12e0612256a600cd77de1cca0b"}}}]}]}, 0x530) syz_mount_image$iso9660(&(0x7f0000000740)='iso9660\x00', &(0x7f0000000780)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000e00)=[{&(0x7f00000007c0)="166496fac0c35e64b29ce6b2390ac2364d0e6474c9670f28143e1c7ce8224d5f8d4b5b97b33fce1ff56587fec50da2d8e6eed5a4b6985f4a396dc66124a2f663a21bf50229a72c8a1ce3992e29943e0454164090724ec1d708e745b17dc5d341902f5eb4493cb284ec52ff6992333226d5458b6733d1ed46e92a190a938cd0d60a4a8b0ca0d7c796a058b35bff30cf382c11f18ca7fac47197a84e856f02524f304102b60c887e3b46ac23ba8589556beebce2245f991297e549b5369cf4a1f8181a13976323809acc2ec57877a5531065e5bc8d5b4f171ad501d7", 0xdb, 0x8}], 0x20000, &(0x7f0000000e40)) getsockopt$ipx_IPX_TYPE(r3, 0x100, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 2018/04/13 09:11:59 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/81, 0x51) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000001c0)={{0x3, 0x3, 0x9, 0x0, 0x6}, 0x5}) 2018/04/13 09:11:59 executing program 1: syz_emit_ethernet(0xd, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0x8001, r2, 0x10001, 0x3}) getsockopt(r0, 0x10d, 0x20000000010, &(0x7f0000320ffc)=""/4, &(0x7f0000d5f000)=0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 256.111731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 256.129747] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:11:59 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:11:59 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fb1fee)='/dev/input/event#\x00', 0x20, 0x101002) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x3, 0x81) getsockopt$inet_udp_int(r1, 0x11, 0x64, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x41) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x45, 0x400000003}], 0x99) mkdirat(r2, &(0x7f0000000100)='./file0/file0\x00', 0x40) 2018/04/13 09:11:59 executing program 1: syz_emit_ethernet(0x76, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:11:59 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/81, 0x51) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000001c0)={{0x3, 0x3, 0x9, 0x0, 0x6}, 0x5}) [ 256.271958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:00 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f0000000240)=0x1000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendmsg(r0, &(0x7f0000001480)={&(0x7f00000000c0)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000000480)}, 0x20000041) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_tcp_buf(r0, 0x6, 0x1, &(0x7f0000000280)='\x00\x00\x00\x00', 0x4) 2018/04/13 09:12:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000012000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xb8, "7cab487dd00c0bb1370e0bf3de626059d087b29c99f1a6410459b22fe4cc3217d65451f04623d69fe9e3d6c22b6331aadf9ec0fcdd643dbe54d0e18432f9d36098481fdd68308f05b89ce19d62f7629f72e5d01e51699dd1c3182043f5c53a65cf6b8ddcf7707100a59de654a553865bbbeaf5632db21e4efc3d9446382c2e3773178ff8d17f632a5a0ab3ae7f37d6d301289b63607b06aec8085d751583c138a09ba4e02f69e1165f3885e9e75862c48ec072e46e48c56a"}, &(0x7f0000000140)=0xc0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x10000}, 0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000a0eff0)={0x2, &(0x7f0000000000)=[{0x40, 0x0, 0x0, 0xfffdfffffff00002}, {0x6}]}, 0x10) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)="96e93600b8e4", 0x6}], 0x1) 2018/04/13 09:12:00 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:00 executing program 1: syz_emit_ethernet(0x20007036, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:00 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0xfffffefffffffffd, 0x32, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000003ff8)) 2018/04/13 09:12:00 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x80000000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="addcd26e009bdafec65b586dd8d80158e12500b56fd996e8e311de14d5325e3554a9b9db4f09e75b72318f3f92c26132294b64f1fbad1247d60c96b4a691dc19515c"], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) 2018/04/13 09:12:00 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:00 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/81, 0x51) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000001c0)={{0x3, 0x3, 0x9, 0x0, 0x6}, 0x5}) [ 256.407580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 256.427606] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) read(r0, &(0x7f0000000240)=""/81, 0x51) 2018/04/13 09:12:01 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x200000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)="76387d98ea4b4f4989d19aaeafa114bfc40005ad383cc1cd5ebdbf6052cfe4afd98ef033d70cb2805aa682cdc86eeda795b48e5ca73c08459652b050245c171cf41a1c85af0541578a7ff4625bf4357f41f018dfc4bf8cd430c483ccbff4c1bcd6752d876420d9177c156d65ac0ecaf063d17748686fa4dc8e3f166c02b6c2833421b4ace149e97d5424798461e73412571ef7831347dfc3c7da7bb65c3e51614cad12e8b1185bd5b1efe5d306c1181eaadbd4") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcbff7)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xfffffffffffffffd) 2018/04/13 09:12:01 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000adfffc), &(0x7f0000d1dffc)=0x4) fcntl$getflags(r0, 0x3) 2018/04/13 09:12:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:01 executing program 1: syz_emit_ethernet(0x7ffff000, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001500)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(tnepres)\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0), 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002780)="a7118230eef5e420406dc6a099da077d64d054e0293b261fd23e223ac994e771d39076c63413ac4c3797871c905a3788788903cb54e0b814d561537a2e51405ff0b5bbcb5fe7f41a21b44db2d47be29e7e805a6d3d2a98cea5945db9b758fad872a60d0c8531afe1dbf4d5962f155c68", 0x70}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/155, 0x9b}], 0x1, &(0x7f0000001480)=""/66, 0x42}, 0x0) 2018/04/13 09:12:01 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x44c00) r4 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) [ 257.379997] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 257.408887] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:01 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/relabel\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x1, 0x3, 0x7ce22012, 0x4, 0xfbd, 0x1aadbdc4, 0x1, {0x0, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0xeb58, 0x3, 0x0, 0x8, 0x100000000}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r1, 0x35}, &(0x7f0000000280)=0x8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000700)) sendto$llc(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x1a, 0x0, 0x0, 0xffffffffffffffd7, 0x8}, 0x10) r2 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00009b4fd0)={0x4, 0x0, &(0x7f0000009ff0)=ANY=[@ANYBLOB="00dc483e"], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000300)={0x6c, 0x0, &(0x7f0000000200)=[@dead_binder_done={0x40086310}, @register_looper={0x630b}, @clear_death={0x400c630f}, @reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000040)=[@fd={0x66642a85, 0x0, 0xffffffffffffffff, 0x0, 0x2}], &(0x7f0000000100)=[0x58]}}}], 0x0, 0x0, &(0x7f00000002c0)}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000380)) 2018/04/13 09:12:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) close(0xffffffffffffffff) 2018/04/13 09:12:01 executing program 5: r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x4, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f39ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0xdaac, 0x947d, 0x93b3, 0x80000000000, 0x2, 0x3, 0xfffffffffffffffd, 0x355d800, 0x9, 0xe27}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x59) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f00000001c0)={0x3, 0x80, 0x5}) ioctl$TCSETAW(r1, 0x5402, &(0x7f0000fd6000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r1, 0x0) readv(r3, &(0x7f0000fd6000)=[{&(0x7f0000313f29)=""/1, 0x661}], 0x1) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000040)) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x78) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TIOCSBRK(r1, 0x5427) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 2018/04/13 09:12:01 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 257.519430] binder: 16324:16325 unknown command 1044962304 2018/04/13 09:12:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x1023c) 2018/04/13 09:12:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe2(&(0x7f0000000040)={0x0, 0x0}, 0x0) r3 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x4, r3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000240)="370f32ba2000b001ee0f01c9baf80c66b810813a8e66efbafc0ced66b8010000000f01c1360f01cf670f200766b9800000c00f326635010000000f30673e662e660cee", 0x43}], 0x1, 0x0, &(0x7f0000000080), 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = dup3(r4, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000decfe0)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000001c0)="f43e0f5172000f090f20d835080000000f22d80f20d835200000000f22d80f1bdd640fb122c74424000f994fa3c744240208000000c7442406000000000f011c240f01cb0ffc0a", 0x47}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_SMI(r4, 0xaeb7) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000580)=ANY=[]) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000480)={0x8, {{0xa, 0x4e22, 0x8, @local={0xfe, 0x80, [], 0xaa}, 0x100}}, 0x0, 0x1, [{{0xa, 0x4e24, 0x8, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x10}}, 0x6}}]}, 0x110) ioctl$KVM_RUN(r4, 0xae80, 0x0) arch_prctl(0x0, &(0x7f0000000100)="6c254dfaef0faa") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000340)="b809008ed0360f017801440f20c0663502000000440f22c0baa000b80000efbaf80c66b8e679618b66efbafc0cecba2000ed332ab8bd000f00d066b95e0a000066b80080000066ba000000000f3065643666dec5"}], 0xf6, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) getcwd(&(0x7f00000003c0)=""/169, 0xa9) [ 257.570591] binder: 16324:16325 ioctl c0306201 209b4fd0 returned -22 [ 257.599393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 257.647601] binder: 16324:16325 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 257.655186] binder: 16324:16325 ERROR: BC_REGISTER_LOOPER called without request [ 257.662810] binder: 16324:16325 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 257.669797] binder: 16324:16325 got reply transaction with no transaction stack [ 257.677308] binder: 16324:16325 transaction failed 29201/-71, size 24-8 line 2763 2018/04/13 09:12:01 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000040)='./file0\x00', 0x0) 2018/04/13 09:12:01 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:01 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 257.737751] binder: 16324:16325 ioctl 800442d4 20000380 returned -22 [ 257.804160] binder: 16324:16325 unknown command 1044962304 [ 257.814081] binder: 16324:16351 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 257.821533] binder: 16324:16351 ERROR: BC_REGISTER_LOOPER called without request [ 257.829131] binder: 16324:16351 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 257.836120] binder: 16324:16351 got reply transaction with no transaction stack [ 257.838435] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 257.843635] binder: 16324:16351 transaction failed 29201/-71, size 24-8 line 2763 [ 257.915276] binder: 16324:16325 ioctl c0306201 209b4fd0 returned -22 [ 257.951491] binder: 16324:16375 ioctl 800442d4 20000380 returned -22 [ 258.029717] binder: undelivered TRANSACTION_ERROR: 29201 [ 258.041327] binder: undelivered TRANSACTION_ERROR: 29201 2018/04/13 09:12:02 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x1a3, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000300)=0xe8) write(r0, &(0x7f0000c85000)="1f00000032000ff2050005000000010000000441060002000000000000007e", 0x1f) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) kexec_load(0x4, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="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", 0xfc, 0x4, 0x7}], 0x150002) 2018/04/13 09:12:02 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:02 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:02 executing program 1: syz_emit_ethernet(0x7ffff, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be2b31eac75c34f"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r1 = socket(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write(r1, &(0x7f00000005c0)="260000005e0009000000eaf83a0000000000000001000000ffffff000008db1ee9ff4435eade", 0x26) 2018/04/13 09:12:02 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x3f) r1 = socket$inet6(0xa, 0x802, 0x88) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x183000, 0x0) ioctl$sock_bt(r2, 0xdd1f, &(0x7f0000000080)="c96d23bcbb5015267170bbc2f802fc72cad7cc86192254317c4f6cbb3e48c51d6d5dcaccdd9e9357af5970e7537ff7d8c15fc345f1e073695c852c4230825a40accd818a76a8a94d0a6646486246a07f62f91e4c18c9e7740a7eb91d79fe64baf9ae01335a652669972d46249faeff151f2e8653a5d165bae6a1cfbe003e8dbf1d44ce4e2c224527db5e755b131dd2ad048f482f3e7ef419d4f109a2a1dff12055663830fe36b2f8dd82e59799fab159b26c0c1918a0359d8003f5d61ef3428fe465d234bf3421167a40dadfa5209cce3b8fd5044b6596964174a9298e71bfd8a9e12ffe59781a8e1c0421dbb6d85477") setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f0000c29ffc)=0x3, 0x4) sendmsg$inet_sctp(r1, &(0x7f0000557fc8)={&(0x7f0000e3aff0)=@in={0x2, 0x4e23}, 0x10, &(0x7f0000b03000)=[{&(0x7f00007fd000)='^', 0x1}], 0x1}, 0x0) 2018/04/13 09:12:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 258.448131] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 258.448753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:02 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:02 executing program 3: timer_create(0x0, &(0x7f0000000000)={0x1f, 0x4}, &(0x7f00000ad000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) pipe(&(0x7f00000000c0)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x3, 0x100) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='ns\x00') readv(r2, &(0x7f0000d0bf70)=[{&(0x7f000041bf0d)=""/243, 0xf3}], 0x1) 2018/04/13 09:12:02 executing program 4: setrlimit(0x2, &(0x7f0000e63ff0)={0x2000000, 0x20080000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80800) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x1010, r0, 0x0) 2018/04/13 09:12:02 executing program 1: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:02 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:02 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000020000)={&(0x7f0000002000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f0000000000)=ANY=[@ANYBLOB="540000001e0001030000000000000000e00000010000000000000000000000000000000000000000000000b1f3add81aec2c0198205623a52d0f000000000000000000000000000000000000000008000b05000000000c0015000000000000000000009b9ef81fe3d11a7887373c7894e312b703f497d52be325535c83c9cd839f21c779640651303dfd4cfd3be4252c26f3cb885309408a1046211a2884ddc9c709f5fb1d4ff861be1b516f48cd240e31e7914fde006f79fbbf6ced479372f14d80aaed0c56e579163a581b3153139b8f2f71b0da00e416987a957587cac20d533ad2b0f876a2ffcc111918e6fda548985359832451c98e83d55495b66682fc89ea492d55475aaa142d0cec921d510e33e39060b6e1e42c33"], 0x1}, 0x1}, 0x1) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x80000, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000380)={0x1, 0xff7, 0x9, 0x6, 0xfffffffffffffffa, 0x0, 0x8, 0xfffffffffffffffa, 0x772e7316, 0xffffffffffff7fff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x1, 0x10, 0x3, 0x4}, &(0x7f00000001c0)=0x18) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000003c0)=""/114) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000300)={r2, 0x7}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000200)={r2, 0xa9, "272ba854c3bed15c390c8e54125a83ca0f8cde3eb84a7c66c8bbca6d2f9062ee20b65e61d478d9bd23c6eb8d4b887c376e67e50cfed4b5b02927f0384259ca78ae75ed549523d6ce4847c541598118d363b6e662000f8f3ee43f2edfee7a66b6e047fa5d30e5283bcee647636264e0bc9a3eb83e182cc9b713711084a52f045df3aa6570eefcb7df7645f40ff88bf7dc1d306770d82763f711416ab7a14538f741d9e89f4c73133632"}, &(0x7f00000002c0)=0xb1) [ 258.595436] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:02 executing program 4: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000040), 0x10) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000051c0)={@loopback, @broadcast, 0x0}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005280)={'veth1_to_bridge\x00', r2}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x4e21, @loopback=0x7f000001}}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000980)='bcsf0\x00') ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@get={0x1, &(0x7f0000000180)=""/58, 0x7}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000007c0)={0x0, 0x800}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="d5469288d5b22486a50c2fa86b2b8e9df464e42a9abea0435c7bdd08cc13fe9379b3beecab04aefdbe936d72cbf810b2240d67a070c864098f5234d6be36cd1a252f29a66e342b53644d4f130425bca633949b08fd7cdb18ca3af495229635a1d8d9001226281bf0231fac049b6ae53138fcee6184d862a6b1aab01a748d703801da1e54d57550b3dcc03f7d7385cef3c54aeec568dcd8c6a297cfa1905afc822e0edb07f9db8f21a80df81b6817a74c2eb6c743feede97d8b6682b3d52137ce6bbf21300313f4cd08c432a3c1f5b9c506"], &(0x7f0000001d80)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000001dc0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, [0xffffffffffffffff, 0xfb, 0x3, 0x0, 0x7, 0xfffffffffffff9e0, 0xffffffff, 0x0, 0x0, 0x4, 0x61, 0x4, 0x0, 0x100000000, 0x1f]}, &(0x7f0000001ec0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000001f00)=ANY=[], &(0x7f0000001f40)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000380)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x10503e, 0x0) pwrite64(r4, &(0x7f0000001600)="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", 0x200, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) r5 = getuid() getgroups(0x40000000000001ef, &(0x7f00000003c0)=[0xffffffffffffffff, 0x0]) fchownat(r4, &(0x7f0000000100)='./file0\x00', r5, r6, 0x100) prctl$getname(0x10, &(0x7f0000000000)=""/162) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x5, 0x102000000000001, 0x6, 0x3, 0x2008}, &(0x7f0000000300)=0x14) socket$inet6(0xa, 0x5, 0x2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r7, 0x1, 0x6}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000280)=0x100000041, 0x4) syz_open_dev$urandom(&(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000004ac0), &(0x7f0000004b00)=0x8) socket(0x10, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000421ff2)=@l2, 0x80, &(0x7f0000ea6f90), 0x0, &(0x7f0000fc1000)=""/86, 0x56}, 0x0) 2018/04/13 09:12:02 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:02 executing program 5: mkdir(&(0x7f0000000940)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='/', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)) 2018/04/13 09:12:02 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x48005000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x108, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r1, 0x4, 0x40a0c}, [@IFLA_NET_NS_FD={0x8, 0x1c, r0}, @IFLA_ADDRESS={0xc, 0x1, @random="89954298a709"}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:02 executing program 1: syz_emit_ethernet(0xfffffdef, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:02 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:02 executing program 3: r0 = socket(0x10, 0x1b409e5da1870d49, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x8000, r1, r2, 0xffffffffffffff81, 0x2, 0x8080) setreuid(0x0, r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40c00}, 0xc, &(0x7f0000000200)={&(0x7f0000000840)=ANY=[@ANYBLOB="200400001300240b2cbd7000fcdbdf25000003ff000000000000000000000000fe8000000000000000000000000000bb4e23000300060000000020805e000000", @ANYRES32=r3, @ANYRES32=r1, @ANYBLOB="07000000000000000700000000000000ffffffffffffffff8e0e000000000000a4ffffffffffffff0600000000000000000000000000009201f0fffffffffffffeffffffffffffff05000000000000000200000000000000080000000000000004000000b76b6e000000020300000000080004001a3d0000b40002006563622d63616d656c6c69612d6165736e692d61767832000000000000000000000000000000000000000000000000000000000000000000000000000000000048030000d5d826f42d9ccecfd7765a07b5131ee49297ec62ab963e1ae609b09426fee1b39a39b98913fc7ad94d733189ef578543e74ed09b585150c5db431ff06a517ee0a3a3a18827537e7ce2f09f5c2ab9e7e37d4819607b5e519f84e8731aa468138014e1f7f9a2436ebb5c000000900002006c72772873657270656e742900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000280200002ac55e566e836446e58c99f19e939761ebea080b326689edd87df41cc8d9ca36a9fb12fedc147697ac2b3c2e4e255296dafef9be0fee25a035cb262ad063ee4a0d05223e7a000000b800120067656e657269632d67636d2d6165736e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004803000040000000f61c6e3a643da26281bf1942b788b3a84cc0faabfffac60f83ee70b2d41ceaab0ec47da0bdfd1d090d6859944a70af06fbcedd39301147180bea37019d4d1efe8db27f58301f5630b0406a7617331f6120ad59062d965cbaea188bbf391175f83fb0d2b35e38efddfc00000034001700060000002dbd700027bd700029bd70002cbd700000000000000000000900000004000000060000000200000081000000300102006362632d63616f74362d617678007761a5f55d65b1c9175f0e3a95000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040070000833e9eefa774fb73bbeca09c1956d67041d52680544ca6aea7347715fa83361f47718bb0b71c0a62d10e5a4066f24633dfb358a0b2101e6470d17a798b9e4b2fed99b2d7f88ec7629a2ba0882e6d0c49696c28e6fe4595240d0f0e20cf86af2eaadf37c6bf463ecaf67c97b8e95405365ba974a5110ffd4cb35e75809e84c19b69ca53dc8c82b2cfe4455f9a50837d8d6d7dd4b31dd793e8367a061330159618f969404590ab63de886304d952a5ec7d124619d1cd1ee858be4353a8a3603aa8994a98cc49e0cf518ab77d77dcb011c7adb6326ec56880c0b64fe04becfb968c35237288e04a2fd4dc0a8e7eab07e1ea814fb39090fa55d2a059a1c0d837978bfc59e2d206bba0c3db76936029533c60c1200996e8bc0607d71c9501bdc09b8b615c09e7659068f803777d763a7c3e93b409424e04430cb096a15b2aa14d533ad37f25f43293f1c5c35fb1e4d162586882c0f4866bbf4982f1992ed8d617e90770929c61de1200777f18bb"], 0x420}, 0x1, 0x0, 0x0, 0x80}, 0x0) sched_yield() 2018/04/13 09:12:02 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 2018/04/13 09:12:02 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 258.835818] ceph: device name is missing path (no : separator in /) 2018/04/13 09:12:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x14, 0x15, 0x301, 0x0, 0x0, {0x2}, [@nested={0x4}, @typed={0x8, 0x0, @uid}]}, 0x20}, 0x1}, 0x0) 2018/04/13 09:12:02 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x89ffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:02 executing program 7 (fault-call:1 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:02 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000400)={0xff, @multicast1=0xe0000001, 0x4e22, 0x3, 'nq\x00', 0x12, 0x7fffffff, 0x61}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) ioctl$TCGETS(r3, 0x5401, &(0x7f00000003c0)) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:02 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x14, 0x0, &(0x7f0000004fec)=[@acquire_done={0x40486311}], 0x316, 0x0, &(0x7f0000008000)}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x11) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x7, 0x3}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e22, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}}, &(0x7f0000000200)=0x84) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000004000)={0x4, 0x0, &(0x7f0000003fdc)=[@enter_looper={0x630c}], 0x1, 0x0, &(0x7f0000002000)="b1"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f000000a000)={0x44, 0x0, &(0x7f0000e49fb8)=ANY=[@ANYBLOB="01634040000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYPTR=&(0x7f00007b9815)=ANY=[], @ANYPTR=&(0x7f000069d000)=ANY=[]], 0x0, 0x0, &(0x7f0000ef9000)}) 2018/04/13 09:12:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000d52000)={0x18, 0x2, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0x4, 0x2}]}, 0x18}, 0x1}, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 2018/04/13 09:12:02 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 258.988743] IPVS: set_ctl: invalid protocol: 255 224.0.0.1:20002 nq [ 258.997771] binder: 16493:16494 ioctl c0306201 200002c0 returned -14 [ 259.053862] binder_alloc: 16493: binder_alloc_buf, no vma [ 259.054912] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 259.059551] binder: 16493:16494 transaction failed 29189/-3, size 0-0 line 2963 [ 259.142897] binder: 16494 RLIMIT_NICE not set [ 259.156799] binder: 16493:16494 got reply transaction with no transaction stack [ 259.164351] binder: 16493:16494 transaction failed 29201/-71, size 0-35715204579328 line 2763 [ 259.193164] binder_alloc: binder_alloc_mmap_handler: 16493 20000000-20002000 already mapped failed -16 [ 259.208940] binder: BINDER_SET_CONTEXT_MGR already set [ 259.213920] binder: 16493:16513 ioctl c0306201 200002c0 returned -14 [ 259.214447] binder: 16493:16494 ioctl 40046207 0 returned -16 [ 259.229258] binder_alloc: 16493: binder_alloc_buf, no vma [ 259.234920] binder: 16493:16494 transaction failed 29189/-3, size 0-0 line 2963 [ 259.246816] binder: 16493:16513 got reply transaction with no transaction stack [ 259.254396] binder: 16493:16513 transaction failed 29201/-71, size 0-35715204579328 line 2763 [ 259.263409] binder: 16494 RLIMIT_NICE not set [ 259.276601] IPVS: set_ctl: invalid protocol: 255 224.0.0.1:20002 nq [ 259.280041] binder: undelivered TRANSACTION_ERROR: 29201 [ 259.289437] binder: undelivered TRANSACTION_ERROR: 29201 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000100)={0x3, 0x1, 0x401, 0x5, 0x31ee}) capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) r1 = socket(0xa, 0x2000000001, 0x0) r2 = getpid() ptrace$getregs(0xe, r2, 0x7, &(0x7f0000000000)=""/139) getsockopt(r1, 0x0, 0x53, &(0x7f000000d000)=""/8, &(0x7f0000fe3000)=0x2c) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000001480)={@loopback={0x0, 0x1}, 0x7, 0x2, 0xff, 0x4, 0x4, 0x1, 0x100000000}, 0x20) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000005ff7)='/dev/ion\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000017c0)={0x3, r2}) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000015c0)='dctcp\x00', 0x6) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000001040)={0xfffb, 0x6, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x6012, r3, 0x0) mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000001640), 0x4) socket$inet6(0xa, 0x6, 0x0) clock_adjtime(0x5, &(0x7f00000014c0)={0x0, 0x6, 0x3ff, 0x6, 0x80, 0x4, 0x5ab, 0x4, 0xa4, 0x7, 0x6, 0x4, 0x7, 0x6, 0xba8, 0x469, 0xffffffffffff8001, 0x200, 0x8, 0x5, 0x5, 0x5, 0x7, 0x80, 0x5, 0x1}) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000016c0)) r4 = syz_open_dev$usbmon(&(0x7f0000001080)='/dev/usbmon#\x00', 0x6, 0x101000) readlinkat(r4, &(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)=""/250, 0xfa) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000001800)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000012c0)=0xb6) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000001300)={r5, 0xefffffffffffffff}, &(0x7f0000001600)=0xfffffffffffffc3d) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000001680)={0x0, 'erspan0\x00', 0x4}, 0x18) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001400)=@filter={'filter\x00', 0xe, 0x7, 0xfe0, [0x0, 0x20000040, 0x20000b78, 0x20000d40], 0x0, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x1058) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000001380)={0x1c00000, 0x105003}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000001700), &(0x7f0000001780)=0x4) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000001740)=0x3) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f00000013c0)={0x8, 0x3a6, 0xff, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x8}, 'ip6tnl0\x00'}) 2018/04/13 09:12:03 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x1) getsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000100), &(0x7f0000000000)=0x4) 2018/04/13 09:12:03 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000400)={0x8, 0x2, [{0x7, 0x0, 0x100000000}, {0x9, 0x0, 0x1}, {0x7f, 0x0, 0x7}, {0xb, 0x0, 0x5}, {0x400, 0x0, 0x1ff}, {0xfffffffffffffff7, 0x0, 0x6}, {0x3, 0x0, 0xeb5}, {0x7, 0x0, 0x7fff}]}) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000540)={'veth0_to_bond\x00', &(0x7f00000004c0)=@ethtool_coalesce={0xe, 0x76, 0x80000001, 0x7c138027, 0x2, 0x8000, 0x4, 0x100, 0x6, 0x7, 0x1, 0x35, 0x7fffffff, 0x100000001, 0xc658, 0x0, 0x1f, 0x101, 0x280f, 0x0, 0x20, 0x2, 0x5ebb}}) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 259.488432] x86/PAT: syz-executor3:16533 map pfn RAM range req write-combining for [mem 0x18d180000-0x18d183fff], got write-back [ 259.512477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5450) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x84ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="a532158b799d4e69cb8a5371881ba46f", 0x10) r1 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000e99000), 0x1ed) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x671}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r2, 0xffff}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={r2, 0x8000}, &(0x7f0000000100)=0x8) 2018/04/13 09:12:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0xce, 0x0, 0x2}, {}]}) ioctl$KVM_SMI(r2, 0xaeb7) 2018/04/13 09:12:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) [ 259.580105] x86/PAT: syz-executor3:16533 map pfn RAM range req write-combining for [mem 0x17c9e0000-0x17c9e3fff], got write-back 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0189436) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x1400], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000002c0)=""/191, &(0x7f0000000380)=0xbf) r1 = userfaultfd(0x0) r2 = dup(r1) getsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000100), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000001c0)=0x1, 0x4) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000000)=""/213) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000f6bfe8)={0xaa}) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0x14a) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000072f000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000200)={0x6, 0x54, 0x2}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000003c0)=0x3) ioctl$UFFDIO_REGISTER(r1, 0xc028aa03, &(0x7f0000000240)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000400)=[@in6={0xa, 0x4e21, 0x5, @loopback={0x0, 0x1}, 0x8}, @in6={0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in6={0xa, 0x4e24, 0x3ff, @dev={0xfe, 0x80, [], 0xe}, 0x1ff}, @in6={0xa, 0x4e24, 0xfffffffffffffff9, @local={0xfe, 0x80, [], 0xaa}}, @in={0x2, 0x4e23, @multicast1=0xe0000001}], 0x80) 2018/04/13 09:12:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00009a9000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x38, 0x6}) setsockopt$inet_int(r2, 0x0, 0x37, &(0x7f0000000180)=0x80000000, 0x4) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, &(0x7f0000000080)="440f20c03504000000440f22c0c40131d86c1dceb9d5080000b888ca867fba841b9a000f3066baf80cb87cdf858cef66bafc0ced460f213f66440f76da0f009e000000004f0f01caf3f0834de99ec4e28dbf1ce1", 0x54}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendto$inet(r2, &(0x7f0000000100)="43cf52b7ba5eff3219c5fc6d819509567f356fd126a74557abe3bc241c7048", 0x1f, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @rand_addr=0x1}, 0x10) 2018/04/13 09:12:03 executing program 3: r0 = socket(0x1e, 0x2000000000000005, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="b442ffd6fec2454b529a55762257754b46e2bac92a974bfc1eca3e02ea44a0ac12e2699374f5"]}) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:03 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000440)={0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2f00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(aes-fixed-time)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="325b8cde92d7255f3c70ebb427da7f6d", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001740)="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", 0x7c8}], 0x1, &(0x7f0000000080)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) munmap(&(0x7f00009ff000/0x600000)=nil, 0x600000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = gettid() r6 = syz_open_procfs(r5, &(0x7f000076c000)='pagemap\x00') sendfile(r4, r6, &(0x7f0000014000)=0x100400, 0xffff) socketpair(0xa, 0x80b, 0x3ff000000, &(0x7f00000000c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@remote={0xfe, 0x80, [], 0xbb}, 0x200, 0x1, 0xff, 0x1, 0x1, 0x0, 0x100}, 0x20) r7 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000e68000/0x1000)=nil, 0x1000, 0x1000009, r7) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x8) fcntl$setflags(r3, 0x2, 0x1) setfsuid(r2) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r8, 0x84, 0x4, &(0x7f0000000400), &(0x7f0000000480)=0xffffffffffffff14) recvmsg(r1, &(0x7f0000001440)={&(0x7f0000000100)=@sco, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001f40)=""/4096, 0x1000}], 0x1, &(0x7f0000001400)=""/6, 0x6}, 0x0) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2100], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5460) 2018/04/13 09:12:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4020940d) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x33], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:03 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = accept4(r0, &(0x7f0000000040)=@in={0x0, 0x0, @local}, &(0x7f00000000c0)=0x80, 0x800) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000100)=0x40, 0x4) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)={0x1c, 0x400080000028, 0xaff, 0x0, 0x0, {0x1}, [@typed={0x8, 0x0, @u32=0x2}]}, 0x1c}, 0x1}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10000, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000180)=[0x6, 0x7]) 2018/04/13 09:12:03 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:03 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:03 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:03 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000400), &(0x7f0000000440)=0x40) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8811306578277563cd5ee04efb86204d8bd488521e1a15bc86aa748ee7f2920000000000000000"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0), 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000480), 0x0) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000140)={[0x1, 0x0, 0x2000], 0x5922, 0x1, 0x9}) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000240)={[0x10000, 0x112000, 0x2000, 0x5004], 0x4, 0x62}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000200)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000600)={[{0xe1}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000300)) 2018/04/13 09:12:03 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc020660b) 2018/04/13 09:12:03 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:04 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:04 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5421) 2018/04/13 09:12:04 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x80) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000200)=0x1000) fstat(r0, &(0x7f0000000140)) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r1, 0x1}) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000240)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) quotactl(0x5, &(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000000)) 2018/04/13 09:12:04 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:04 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 2018/04/13 09:12:04 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:04 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xf0ffffffffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:04 executing program 4: r0 = socket(0xa, 0x2400000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0xd734, 0x100) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x4e710c8b, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f00000000c0)=0xfffffffffffffe3e) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x2, 0xffffffffffff8000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={r1, 0x3}, &(0x7f0000000100)=0x8) 2018/04/13 09:12:04 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0045877) 2018/04/13 09:12:04 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:04 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:04 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getpeername$packet(r1, &(0x7f00000003c0), &(0x7f0000000400)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:04 executing program 3: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:04 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) [ 261.270251] nla_parse: 11 callbacks suppressed [ 261.270260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:05 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5452) 2018/04/13 09:12:05 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x28000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:05 executing program 4: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) finit_module(r0, &(0x7f0000000000)='eth0\x00', 0x1) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) 2018/04/13 09:12:05 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 261.330270] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:05 executing program 3: r0 = msgget$private(0x0, 0x4) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/101) semget$private(0x0, 0x0, 0x0) unshare(0x40600) r1 = inotify_init() fcntl$notify(r1, 0x0, 0x282) r2 = dup3(r1, r1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x0, 0x5, 0x20, &(0x7f0000e00000/0x200000)=nil, 0x8}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000200)={r3, 0x90, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e22, 0x9, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @rand_addr=0x9}, @in6={0xa, 0x4e22, 0x7, @empty, 0xdbca}, @in6={0xa, 0x4e20, 0x9, @empty, 0x7fff}]}, &(0x7f0000000240)=0x10) 2018/04/13 09:12:05 executing program 5: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:05 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:05 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x300], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 261.510151] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:05 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000), 0x3) 2018/04/13 09:12:05 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0045878) 2018/04/13 09:12:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:05 executing program 3: r0 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x1, 0x200, 0x0, 0xc6c, 0x8, 0x9, 0x40, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r1, 0x1000}, &(0x7f00000000c0)=0x8) flock(r0, 0x7) write(r0, &(0x7f0000fcf000)="240000001a0025f0006bb4040000001d0a0b00ff0010d300001000eb080002007fffe5b7", 0x24) 2018/04/13 09:12:05 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="06e35f89adf38e0f47fa7e5d396fd771f25e90704c92a8c8b8f69c2942ae94468f7496174eec6c8a462a91a2d5df242100ed1b5f7d14ee9a6c4019fe51d65381db11481d1667d5df50c6a5185644d4ee644d6047b0dd046ef274649c75a8a7c6a564a1768795d08c967fc114176bf0d7cd4b975de3c4e44d7d53b72b5187b43dd002014c0fed5379abb0545ef3f281ca7b48c6d498d508e1a52cdd29193378ab718c9ad9b4857b7dce981e7fcdbe"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000480)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:05 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:05 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:05 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffff84], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:05 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x2) 2018/04/13 09:12:05 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000100)=""/101, &(0x7f0000000180)=0x65) r3 = syz_open_procfs(r0, &(0x7f0000000000)='environ\x00') r4 = dup2(r2, r1) exit(0x0) dup3(r4, r3, 0x0) 2018/04/13 09:12:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:05 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000200), 0x1) syz_open_dev$tun(&(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0xfffffff000000000) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x15}}, @mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x5, 0x0, 0x100, 0x3, 0x210364}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x104, 0x70bd29, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000340)={'bond_slave_0\x00', 0x8}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000380), &(0x7f0000000400)=0x4) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/107, 0x6b}], 0x1) 2018/04/13 09:12:05 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffffffffffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 261.708918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 261.732154] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:05 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:05 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 261.861672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:06 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:06 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x300000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:06 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x40049409) 2018/04/13 09:12:06 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00002d9ff8)=@fragment, 0x8) sendto$inet6(r0, &(0x7f0000fdf000), 0x0, 0x0, &(0x7f00003e0fe4)={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 09:12:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x2004, &(0x7f0000001600)) 2018/04/13 09:12:06 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x100) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TTUNGETFILTER(r3, 0x801054db, &(0x7f00000003c0)=""/58) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:06 executing program 5: syz_emit_ethernet(0xa, &(0x7f0000001300)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)) 2018/04/13 09:12:06 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:06 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5451) [ 262.790847] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 262.823648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r1, &(0x7f0000000fc0), 0x0, 0x2004c044, &(0x7f0000000000)={0x2, 0x4e25, @multicast2=0xe0000002}, 0x10) sendto$inet(r1, &(0x7f00000019c0)="a6a9a3f56583431111ba5e897aeb82bf99870a903fd52ddac5a9f76974f34ffb5f4ced5be82df85383e128236b5af596afdba07c93374f1f946ab4414901f8ad2b55739bcd6ec77e48900767778c4a5ef746d174e4789acc2ba8c039282b4f9887843471ed1743c0128e740d609686f86be951c00ddf5cf32d2fc01624bfa68690c55ac0cca0f5227056687455008fc3cdf1be7aac994572aca8a11295adcb67fbcf545075daeb36662a03625be2f56ca6d3ef9594cd1970911d4849e96dd60a70d62a2f7cdb16554ec0036df682271c3814cae02f7292c25b8b5b87f896b4c69075779f2cab7cdf6235def9f147155c38dc705b245eaf5838e784dc0a76546044e7ff110583265f05ea28f70a15fd0c95f3b2344e58fc45b88473016fc265a37eaea26e33168d8636515a5d906918be01d6edaf5457264694703861d43f623c0704ea04fe7648c86bb84dc8f01bc107719300574444cf3c8cebf5f2247d22a49c51195e737712ca338fdffb3081230a1ebe56b1affe539a7592685e79a908d28e72d2d6da033f45cabb4a4f37ac2dc37f02a119b7702e70e9d110006ad0b0c9f43cb258a98d905301983ff6eabd1f1c8d6acea7028d17b8c6ea93c691f3360ea9ae73a7eed340b9d9c8644634165ab56875a7b830414878bf390b3b56898d8d9ee7bae76bdfca53074ddc6131fbe946b136fe73f5eabb23823ee23a7852e57e36ab7b1d5318d2a6d0a44611c94a625b777fbc8695793edb17c49a44a17f08d85c9606d4b37164c8db72ddef88fc2556600abecc8a316eee77cb6c1b4c4ba7fb3ecbbb411a96481e9ec910852bc7e5fff6d7ac7a33f9ca7123d46d1f26559c67b1148865da8756e1f7ea7470dda73dbc2ba6e15833a152d7742bf853ee807c82570c193edfa852d67b9eb5d4b86f40b8ae2eee660e2922d4b07efd9450305a5919f29d6e887eef7700f038888cb52fa710c6b196d1445abbfbc2d167223a56a6a1c2dbbbbe454e2a473bf7f45c18eba2f8fb6f80874bc76de999de8805da9dea7ac23673592564b8ce27ad613ce54d5b7e5c616681b05177fba960720efc62e5150687734de121214d85a03d1c6ebe8c5126400fea6c8863c319ee307fa055d332a2af3862acce8c9c1a3191c7c99c40ed267635464634c05337fad5863cc3b5ccd8aaea780610d12456c55d6362a8dfd7ae26e09fcaee810623a61afb7f2729e7f5e9b2fd5a59d05b4ccb78342362325b6448d7bed7cc0e656aece332424abb6bce15156fc1278828cf8889bd073f7d5944bc6d9605eee647b4ff89131bab47bc9833ecdc56f28d8cfd47edaf1138cbed1949e1b358bb7b6208e35d05ae59cbf92925250ee30e8d4adbbe01e845457564f8748bba11e0c3bcb09a719d65eb7914cbd24983c791912933e81635339e1cec1cdcede387954d89df271731ecaf419831b50bf41104530f3a9f4a2f2e19f04fe4ad8900649ae80be14c3230537c683ac4cd2fe32a26622b275f2346d955be48d95adf7aaa248dc5a755871a54563b27a80de21411993c0d30982bd0708375ecca4ba0d5332a921006913db049e0de8a52cc7af87171bf254d346f645edb9fa8a37c7f2b3b367094f6906df83dfcbec96138fb4923a0a881425a74e05799abc5299b9f46deb09f5495ead5d564027d491485d703df248db057392a51f81ba11e681266e6a6c71662fa1d6e434b79eadf767e24690939b366d666c004436b8572da8259c661ba83b8432ead8265c79c817d3653330de85b61718553e0dd1d99a80231e073a69b411026c739468f8db80e8a8b656cd3fe963ec267b4cd6094bf0849d0864f4ecc0016e0a2c18486d4bbb22aa06cce4f8fe12303d5a94b1cf57463a945557aaa980ffb0ab065fde4c3d0807f4cb304de62f3b57209926d68b0d598890e8e92668994e56ea2a7283355997b733d9881f7547718b143adab6fd53205cb62b7e781d434d9147db410b9310d4257dcde2bfac8d28ac5875736957ee9e440977f427de3f3df7b18e1b1a40c6583701413a656afd4f51af34e387d44da2c70f424a2f2602ab0567235aa79220296", 0x5c1, 0xc000, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, 0x10) dup3(r0, r1, 0x0) 2018/04/13 09:12:06 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000017c0)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) 2018/04/13 09:12:06 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x754, 0x7, 0x0, 0x20, 0xffffffff80000001}) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) socket(0x2, 0x2, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f000000eff4)) read(0xffffffffffffffff, &(0x7f0000000000)=""/4096, 0x1000) 2018/04/13 09:12:06 executing program 7: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x10000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:06 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:06 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x29000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:06 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="ff3997ffcd00aabcaaaaaa0086dd60816def00303c00fe800000000000000000000000000000ff020000000000000000000000000001001b000000000000c20415000000c910ff0200000000000000000000000000014e204e2004019078008762c3009e60ab"], 0x0) [ 263.018186] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:07 executing program 4: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@broadcast=0xffffffff, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/13 09:12:07 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:07 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x4000) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x6, 0x52, 0x8, 0x0, 0x6, 0x11}) recvfrom$inet6(r1, &(0x7f0000000080)=""/194, 0xc2, 0x10040, &(0x7f00000001c0)={0xa, 0x4e23, 0x7ff, @empty, 0x9}, 0x1c) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000200)={r1}) r2 = add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)="44d6c1a28883f83fb9ec9cf5e2f337005c7696b743fe980eb3b8c5c5cc05cbca8efe27ac23e3c8fab4cff35e9b8a188f0a29f6aa213a", 0x36, 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000440), &(0x7f0000000480)=0x0, &(0x7f00000004c0)) keyctl$chown(0x4, r2, r3, r4) 2018/04/13 09:12:07 executing program 3: r0 = gettid() exit(0x0) syz_open_procfs(r0, &(0x7f00000002c0)="000600") 2018/04/13 09:12:07 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty, 0x6}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:07 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000580)='./file1\x00', 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0xffffffffffffffd4) 2018/04/13 09:12:07 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:07 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2800000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000fdf000), 0x0, 0x0, &(0x7f00003e0fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1) [ 264.093796] encrypted_key: insufficient parameters specified [ 264.104841] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 264.122008] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 264.137762] encrypted_key: insufficient parameters specified 2018/04/13 09:12:07 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bdev\x00', 0x0, &(0x7f0000000100)) 2018/04/13 09:12:07 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 264.235584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:08 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x33000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:08 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x800) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x5, 0x7}) 2018/04/13 09:12:08 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000040)="be38fc69faea5bd09bf0307006cefbafc01c3062dfedf949ad4e86bda4029155e2d6181bc9f0d25d4a23fed54bd250db05a0fbd78679ca006afa4ee44cb7b522c4a38231a9f99b3001e1d4857321a6a7c9e36ae424cc0d49fdb6c13c422fde782dd0c18a3a4018030b94ba6b7ff3f3192f8c563a1986d839c40052c8d3a78ae29126", 0x82, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000000500)="acbb915d6846975d5d248d4c727115f29ae03c05a1540f5303683cc3316fab70b8f72443207b3bc9d2b76a2124327a8dc22115702dfd81d9c5daf3734095c968bb4c931a63cd940101810cf243974b73d5c0d300e011c378c17bde5460ef55a7bcfe93f760a0a1928b8c0954a22b092351d191ed0effdcf4ac142f1fd6395e0e7303", 0x82, 0x4c881, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000940)="9e", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) shutdown(r0, 0x1) 2018/04/13 09:12:08 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000500)={0x0, 0x8}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000004c0)={0x0, 0x8}, 0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000300), 0xffffffffffffffff, &(0x7f00000003c0), 0x812, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x10, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000340)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'dh\x00', 0x25}, 0x2c) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000001d40)={'lo\x00', 0xfff}) socket$inet_sctp(0x2, 0x0, 0x84) pread64(0xffffffffffffffff, &(0x7f00000006c0)=""/156, 0xffffffffffffffd5, 0x3) write(0xffffffffffffffff, &(0x7f000095c000)="2400000026007f0000000000000077010000", 0x12) 2018/04/13 09:12:08 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:08 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x800, 0x0) connect$vsock_stream(r0, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:08 executing program 3: 2018/04/13 09:12:08 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:08 executing program 3: [ 265.147352] device lo left promiscuous mode [ 265.147412] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 265.153909] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:08 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2c00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:08 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:08 executing program 4: 2018/04/13 09:12:08 executing program 3: 2018/04/13 09:12:09 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:09 executing program 5: 2018/04/13 09:12:09 executing program 3: [ 265.427192] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:09 executing program 4: 2018/04/13 09:12:09 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:09 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0xffffffff, 0x7}, 0x1, 0x8514, 0x800, {0x400, 0xfffffffffffffff7}, 0x20}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:09 executing program 5: 2018/04/13 09:12:09 executing program 3: 2018/04/13 09:12:09 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:09 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:09 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a725759aad16ff9d2ecef58bdb724bb451b47e54e29bab885e01415d199866b1061a9fb7d0762667cfc1eb58b332ded5283abfbf170361b4fc719b532222df1c8b68595f68aac11d9e5b83780faf59"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:09 executing program 3: 2018/04/13 09:12:09 executing program 5: 2018/04/13 09:12:09 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffff88], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:09 executing program 4: [ 266.018898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:09 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:09 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) 2018/04/13 09:12:10 executing program 4: 2018/04/13 09:12:10 executing program 3: 2018/04/13 09:12:10 executing program 5: 2018/04/13 09:12:10 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x1100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:10 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="030004000300020400003693"], 0x10) socket$inet6(0xa, 0xb, 0x98) 2018/04/13 09:12:10 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:10 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a28ba9a1bcaca33369b3d627cdb61256e31232012487096e13293992629e2168e5456056c6e03b971f7c8bfce31208af6ed322120a8ecf015caaf64accb029199fbded80ad618fdd807a6c493af290ca27cbf8a13a2dd9a024981104d158c7031ca059408c37449ae0d2786bb61a350d69e8a26d0d0073df29284e3bbc37ecbbd83c85df05cdeb4be4ec100bc8d63fa5d14b5a7aafcdc9e808fa6e1d933035a85f0ce59de12cd6cc7bb9e01740a11f1855403031932700000000"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:10 executing program 5: 2018/04/13 09:12:10 executing program 3: 2018/04/13 09:12:10 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2f000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:10 executing program 7: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80101, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 266.920146] nla_parse: 2 callbacks suppressed [ 266.920155] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 266.937513] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:10 executing program 4: 2018/04/13 09:12:10 executing program 3: 2018/04/13 09:12:10 executing program 5: 2018/04/13 09:12:10 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x88ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:10 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:10 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:10 executing program 7: socketpair$inet(0x2, 0xe, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0xd29, @dev={0xfe, 0x80, [], 0x21}, 0x20}, @in={0x2, 0x4e20, @multicast2=0xe0000002}], 0x2c) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) 2018/04/13 09:12:10 executing program 4: [ 267.172921] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:10 executing program 3: 2018/04/13 09:12:10 executing program 4: 2018/04/13 09:12:10 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:10 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) readahead(r0, 0x20, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @rand_addr}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_getaddr={0x34, 0x16, 0x400, 0x70bd27, 0x25dfdbff, {0xa, 0x1f, 0x80, 0xfd, r2}, [@IFA_FLAGS={0x8, 0x8, 0x414}, @IFA_LOCAL={0x14, 0x2, @local={0xfe, 0x80, [], 0xaa}}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000000)={0x2, 0x0, 0xe06}) openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x40000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:10 executing program 5: 2018/04/13 09:12:10 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='mountinfo\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000400)={0x1, 0x0, 'client0\x00', 0x2, "e3b93ad9058a2eea", "6ea865fb81afcaa2aac702b17da271940dcf10a8ba65b3dc35cf27857a946f37", 0x1ff, 0x10000}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:10 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:10 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:11 executing program 5: 2018/04/13 09:12:11 executing program 3: 2018/04/13 09:12:11 executing program 4: [ 267.350492] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 267.359054] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:11 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x1100], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:11 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:11 executing program 5: 2018/04/13 09:12:11 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 267.515356] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:11 executing program 3: 2018/04/13 09:12:11 executing program 4: 2018/04/13 09:12:11 executing program 5: 2018/04/13 09:12:11 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:11 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4200, 0x0) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x4, 0x26cc, 0x8, r1, 0x6}, 0x2c) 2018/04/13 09:12:11 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3c], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:11 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:11 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="7518d13416ccae837cb959274509759da70000000000000000000000"], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r0, &(0x7f00000004c0)=""/154, 0xfffffef2, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:11 executing program 4: 2018/04/13 09:12:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000180)={0xa}, 0x1c) [ 268.154975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 268.186100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:11 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:11 executing program 5: getpgrp(0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f00003efff0)) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x7ffe) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r2, r1, &(0x7f0000335ff8), 0xffffffff) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000001c0)) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) fstat(0xffffffffffffffff, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000deefe7)=""/128, 0x80) 2018/04/13 09:12:11 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000000)={0x4, r0}) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb2, 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r1, @ANYRES16=r0, @ANYRES32=r2, @ANYRES32=r1]) mmap(&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x11, r0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) 2018/04/13 09:12:11 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:12 executing program 3: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x209}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000002240)={&(0x7f0000000c40)=@can, 0x80, &(0x7f0000002140)=[{&(0x7f0000001d80)=""/198, 0xc6}], 0x1, &(0x7f00000021c0)=""/128, 0x80}, 0x0) socketpair$inet_icmp(0x6f2000, 0x2, 0x1, &(0x7f0000000000)) 2018/04/13 09:12:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000d40)={0x1, &(0x7f0000000080)=[{0x40006, 0x0, 0x0, 0xa85}]}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r1, &(0x7f0000000fc0), 0x0, 0x2004c044, &(0x7f0000000000)={0x2, 0x4e25, @multicast2=0xe0000002}, 0x10) sendto$inet(r1, &(0x7f00000019c0)="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", 0x9c2, 0xc000, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, 0x10) sendto$inet(r1, &(0x7f0000000c80)="0f1ed60bc77a3ef40af76e533385cbdb6261c352d606d7082af853df080db6854ce60e20205fb7139947effe1ef246abb68b80ba3f1aa84ffe677e43be57591e69ea4660be682e91014d4848d13649defb82d0c022760197e2bbe1513f51a8048c6b74087bf842768b8401513185c76d2da6a331131f601e90a0c5f69cf1297ee9a08afeb22fba3b22984b6a929a74964b827aacdf6c0cba9d76", 0x9a, 0x0, &(0x7f0000000b40)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 268.315881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:12 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000, 0x60002) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x7, "0a5cbf635fc24b"}, &(0x7f0000000080)=0xf) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000280)="44c29088dcc0f61a5f77aebb331ee02fae4db41c532cd611bd3b82409a1be1ac25e9aa98eee756ccfa56eb4b73f289e3a610b4559e979e48e5609980cb1f51587562e8a08ec80cf0bae8addfdeb67bd1870cf81240173b6eaf299a33ec398cd928374f76fe86d9a07336cdb995f8604b2de3d9ef70edeef5fc60ed80a79dd6540dfa2121ffb60fb683d5c953565b691bbd8b920037c089f529d571680e7cda64fa4df9111ef9e7cbb3a5ec4d15fe0749c9549637313358a4901e4f3b94585b0fac2eba7e78dfadbc822979c67e411a25b54000ce01772c3f2dec2f818cbc3ed4d7204eb1d3a9279542efc8060198611dc5f40e1093f8c80dd0") getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="77000000b0927ef98d628691a98cf3f2df7487e7b61e20abd87b7cd6e58d47762d71468f6ee332f06574e10e9a453f90e3ed885da5dd3e42f2936acfb23152d22facbbecb144488c7544941171088d977c947907d8c10ceb68f7f764eb9d198f485f058c83f8cf258b943ad0f3789d79399b3858e282787640e7c2748a2aba0ab86074c598d2c75fcd95fb5a949ed92a562dc5b8b270a100000000000000eeffffff00000000"], &(0x7f0000000140)=0x7f) lseek(r1, 0x0, 0x3) 2018/04/13 09:12:12 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:12 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x400000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:12 executing program 3: r0 = socket(0x1e, 0x805, 0x0) close(r0) 2018/04/13 09:12:12 executing program 5: getpgrp(0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f00003efff0)) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x7ffe) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r2, r1, &(0x7f0000335ff8), 0xffffffff) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000001c0)) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) fstat(0xffffffffffffffff, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000deefe7)=""/128, 0x80) 2018/04/13 09:12:12 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x5) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) 2018/04/13 09:12:12 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000003c0)={0x5, r0}) readlinkat(r1, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/46, 0x2e) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:12 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:12 executing program 4: getpgrp(0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f00003efff0)) signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x7ffe) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) sendfile(r2, r1, &(0x7f0000335ff8), 0xffffffff) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000001c0)) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x38d) fstat(0xffffffffffffffff, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000deefe7)=""/128, 0x80) 2018/04/13 09:12:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) 2018/04/13 09:12:12 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x14000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 269.141222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 269.163999] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:12 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f00000013c0)=[{&(0x7f0000000080)="1cfedfd94e4ca7885f9d4a09147f74dde57c6eb345d6a163f027e2152b9f0d30fe5a9805de92947514b3cc91bbfecf5ec6cab734f6f250984f250947c6269104d22ed5bc5f6321eb532ba26ac0a58e0e99ce78dcc46534e54c817e41b090e2e9001bf7b7d7ee9c9bfafeab13efa615fecbe8bc3f411a3fceac94a609e5c362417341f83afdbe1d8c9ec55dcd9d0ff240430d8816b3273172eb580b34460270aed347166349b9f6de935e517858b183efa28015ae64da717884c74cab786bde9fac68ed37e9913deac5e7fd4116bccc946f7df8e0599bd8d0c93f41fe835f5d895da593fe405ac6", 0xe7, 0x9}, {&(0x7f00000001c0)="853fd2a7343a9dda5e10f386126ea2d1434e6bf58f3575dfb8502d4be3bf88d3e2cc55f9e150be51529a7dfb26a8d327adde80ecd74167dbeb159ba7b3b76bf2eb96279075095439fc73c3236168e8e5e7d4e11c024df7cf11d4fcbe38cfa135ad7d5dfe281a212f51ec059264dff7095843d7f3f967f8a8e3b78d5baf691fcf799cd2", 0x83, 0x2}, {&(0x7f0000000280)="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", 0x1000, 0x3f}, {&(0x7f0000001280)="808af3ad800e05db363b15d74267b98bf0e0b7c56d0ac8817e2f42ae50f144828e36120e00c048ef851b492bc4af4b7d56e3edbc8cdbfd37b4", 0x39, 0x503}, {&(0x7f00000012c0)="0b3496275abd8801564580edac8ef8e750afc0ce4510f9a0d15f0234345524c08839760724253f163ece2695423d8cc45c6c88f92470294b5b6f9d8f53db136a0af81576c1d1dc8ec1f3a05a7e5ee6cf07ac03ed209a243ba2c9e007c9ef4e36c6fa43932a7539d2a172af3fd9a7c12e4c90bd7c5232374cef32b8e784e1bf2c5a0235dc6ecf7bf0983da08446cb0ae479d8b5a40b9e657afa48ee99a89443af6e080fb7d16a26d049de479cef1915dcf65082b9b63347b87f577665ea0fc1", 0xbf, 0xff}, {&(0x7f0000001380)="8612c4decfff26727d1c9e", 0xb, 0x7}], 0x802, &(0x7f0000001480)={[{@acl='acl', 0x2c}, {@datasum='datasum', 0x2c}, {@clear_cache='clear_cache', 0x2c}]}) 2018/04/13 09:12:12 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:13 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/13 09:12:13 executing program 3: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='mountinfo\x00') ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000400)={0x1, 0x0, 'client0\x00', 0x2, "e3b93ad9058a2eea", "6ea865fb81afcaa2aac702b17da271940dcf10a8ba65b3dc35cf27857a946f37", 0x1ff, 0x10000}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) [ 269.393925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 269.432743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:13 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x1000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:13 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:13 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='auxv\x00') ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000140)) r2 = shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/253) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:13 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:13 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:13 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) r0 = getuid() socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000440)={0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000480)={@rand_addr, @loopback, 0x0}, &(0x7f00000004c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6, 0x4e22, 0x0, 0x4e21, 0xc8, 0xa, 0x20, 0xa0, 0x87, r2, r0}, {0x200, 0x0, 0xfffffffffffffffc, 0x80, 0x4, 0x80, 0x6, 0x81c}, {0x7, 0x5, 0x10a, 0x7fff}, 0xfffffffffffffffd, 0x6e6bb3, 0x1, 0x1, 0x2, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d5, 0xff}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x15}, 0x3505, 0x1, 0x2, 0xf7f, 0x8, 0x9, 0x100000001}}, 0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f00000003c0), &(0x7f0000000400)=0x4) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@assoc_value={0x0, 0x9bb}, &(0x7f0000000640)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000680)=@assoc_value={r6, 0x81}, 0x8) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = accept4(r7, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x80, 0x0) sendmsg$FOU_CMD_GET(r8, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r8, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r4, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:13 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:13 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:13 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:13 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 270.176453] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:13 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffff7fff, 0x84040) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@generic={0x4, 0x4, 0x3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 270.227636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:14 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:14 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5460) 2018/04/13 09:12:14 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x11000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:14 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1000, 0x402080) getsockopt$inet_udp_int(r1, 0x11, 0x3, &(0x7f0000000040), &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:14 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:14 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8}]}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000004c0)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = accept(r0, &(0x7f0000001ac0)=@generic, &(0x7f0000001b40)=0x80) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001b80)={0x0, 0x400}, &(0x7f0000001bc0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000001c00)=@assoc_value={r2, 0x7fffffff}, 0x8) listen(r0, 0x4090) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x3, 0x7, 0x80000000}, &(0x7f0000000280)=0x10) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000640)={0x6, &(0x7f0000000580)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {}]}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={r5, 0x855}, &(0x7f0000000300)=0x8) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x9}, 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5, 0x800004000000032, r3, 0x0) r6 = accept4$inet(r4, &(0x7f0000000340)={0x0, 0x0, @multicast1}, &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x800000000, 0x8, 0x0, 0x0, 0x4}, &(0x7f0000000480)=0x98) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x40000, @remote={0xfe, 0x80, [], 0xbb}, 0x66ea}, 0xf) accept(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000180)=0x80) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x3, 0x7fffffff, 0x9, 0x5}, {0xb3, 0x9, 0x9, 0x8b}, {0x0, 0x5, 0x80000000, 0x9}]}, 0x10) connect$can_bcm(r7, &(0x7f00000001c0)={0x1d}, 0x10) [ 270.376060] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:14 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f0000000400)={0xa, 0x4e22, 0x2000000000000, @mcast1={0xff, 0x1, [], 0x1}}, 0xa) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:15 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc020660b) 2018/04/13 09:12:15 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x80102, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:15 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) r0 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:15 executing program 4: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f0000000080), 0x1) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@mcast1}, &(0x7f0000000040)=0x14) 2018/04/13 09:12:15 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f000000afd4)={0x326, 0x21, 0xaff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, @u32}, @typed={0x8, 0x14, @u32}]}, 0x24}, 0x1}, 0x4010) 2018/04/13 09:12:15 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x400, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0045878) [ 271.682938] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:15 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x89ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:15 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:15 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0xf6ee2def99df9322, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x101900) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x8, 0x1, [0x2731]}, 0xa) [ 271.928558] nla_parse: 2 callbacks suppressed [ 271.928566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:15 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x400, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x2) 2018/04/13 09:12:15 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:15 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40c000, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000080)={0x0, @multicast1=0xe0000001, 0x4e21, 0x0, 'dh\x00', 0x8, 0x3, 0xa}, 0x2c) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x80, 0x80080) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={"69705d6d746930a70a00000000000004", 0x200}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:15 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:15 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000003c0)=0x1350, &(0x7f0000000400)=0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:15 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6c00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:15 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4020940d) 2018/04/13 09:12:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000607000), 0x8) getsockopt$inet6_opts(r1, 0x29, 0x100000000000039, &(0x7f0000001100)=""/4096, &(0x7f00003c9000)=0xfffffffffffffe2a) getsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 2018/04/13 09:12:15 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:15 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = dup3(r0, r0, 0x80000) sendto$ipx(r1, &(0x7f0000000000)="784177cf2d1088220533a3c85e33bb648e86a837776d1b33d7f4a9129d6390f4", 0x20, 0x20000001, &(0x7f0000000040)={0x4, 0x1e, 0x5ef4, "f62e3db291b5", 0x9}, 0x10) [ 272.092972] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 272.118894] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:15 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x21], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:16 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 2018/04/13 09:12:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000400)=0x5) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000010bfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000e16000)={0x2, 0xb, 0x0, 0x3, 0x2}, 0x10}, 0x1}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x81, 0x4401) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) r3 = getpgid(0x0) kcmp(r2, r3, 0x1, r1, r0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000080)) getsockname$ipx(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) 2018/04/13 09:12:16 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x402001) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0]) sendmsg$netlink(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)={0x184, 0x27, 0x0, 0x70bd2b, 0x25dfdbfc, "", [@generic="e76f7b62f959435f50132a161c396051b1c45d6b608c24451a53ba63a0b6819c8b8df7cf3e882a4b5c2e035205c4e923154cbf504ed447da8e8fbcff707831fd7121de304e844a7e4a29cb0e4940d0d5a042c428fc684d5922e7c85fce8c2a54f383ff36ece48c4424d6409b089efaf717f2121cb1a7fae4353657bc86c279dd432af4c460bebe1689f2dc906a084af2743dc1e5b053f15e2f04880f06be5efa2b935f569d8da9fdec98faa52a69510e9dde797b778251e61f9277fa78132e8308c95720a40904e1defa", @generic="86041ec8ac5024bc3b3cc1f3319c9b06772379b1310367416d82e0895cf015a9092f29b26a0fccfb34cd53a8c902f1643820e754dbc28c9d870bb34a2a38a649f4e5de0749bcf45279081fe3c089547282fca2ff80bce151c10fdad9a6e6290042f3781870fe630d8b47bfdc47769b814eb7da1f7b79b73eb264d114fc028a33427d41ac729271e8da26b5c415dae2ff4c25d0", @typed={0x14, 0x22, @ipv6=@loopback={0x0, 0x1}}]}, 0x184}], 0x1, &(0x7f00000005c0)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x10, 0x1, 0x1}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x80, 0x4000000}, 0x40011) 2018/04/13 09:12:16 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x84ffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 272.439565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 272.476365] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:16 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x41, &(0x7f0000000000)={0x0, 0x2f, 0x5, 0x4}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000007, 0x20010, r0, 0x0) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5451) 2018/04/13 09:12:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:16 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 272.648368] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:16 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x10000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x80005, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:16 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x1400000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:16 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x40049409) 2018/04/13 09:12:16 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000400)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x810, 0x70bd2b, 0x25dfdbfb, {0x3}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040010}, 0x200000c0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="78330dc6e98ba3906203d5617cd79ccc030c51df50c52eac5f9ad133d31bef7619a8ec77cb71ad16b5b74b13e8567cb14779e353a1e0deac7ded674e4632e44aa2d66e9513d9a7853a2bd602b1628c8cec65a475a40a6306419888846757b8416ff2ba1c518cc319fb410c17abd07db5a80cf693253eb8fcecb78675f3fd41993798b75f588c0184a8b2fee2d520873a0100d87ce53c0649d8e3d7"], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 272.869360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:16 executing program 7: r0 = memfd_create(&(0x7f0000000000)='/dev/loop-control\x00', 0x2) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0x3ff, 0x1bb}) r1 = memfd_create(&(0x7f0000000080)='/dev/loop-control\x00', 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f00000000c0)={0x100000000, 0x7f}) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5452) 2018/04/13 09:12:16 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3a000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:16 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x41, &(0x7f0000000000)={0x0, 0x2f, 0x5, 0x4}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000007, 0x20010, r0, 0x0) 2018/04/13 09:12:16 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 272.917503] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:16 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0045877) [ 273.094644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:16 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x32000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:16 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:16 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5450) 2018/04/13 09:12:16 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:16 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) chroot(&(0x7f00000003c0)='./file0\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:16 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5421) [ 273.320439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:17 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:17 executing program 7: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x4, 0x0) 2018/04/13 09:12:17 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x29], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 273.386766] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:17 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0xc0189436) [ 273.497189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:17 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xfffffffffffff000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:17 executing program 7: openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) mq_unlink(&(0x7f0000000000)='\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000340)='wlan1\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r1) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000100)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000080)={0x8, 0xa40, 0x6}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) lseek(r3, 0x0, 0x3) 2018/04/13 09:12:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:17 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:17 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x240, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000440)=0xc0, 0x4) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000004c0)=""/64) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="7cc133432ac013ff5dd74e489652e58837ef9b6cfe82dc3b83745ecaa6e00d4edf28bccb5bdc85218fccf1a4afbc52023e5fb8829cba739423d4281eb27d0e61f7dc70421b373c32ecd3d33d19bf16de286795160276aaab77341df9d589291d60a9809613c61aa2268409f33febfabec7ebc566b103d6ee31b7467f32c997319ede59f1f941e09b5155102f1c27eac30821820de2579698f52f4da74050182005220647a5350befa357f059f66ab0b5f37ecebf44180eb17a4e581c2655e2437384d09a95e3c374c8ab2dacbd68ec0c4a326b5159ce858779a5a9116342981fb1b43eee32"], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:17 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 273.730531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:17 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='ns/pid\x00') ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) [ 273.777581] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:17 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1ff, 0x400200) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000017c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001900)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001a40)={'vcan0\x00', 0x0}) getuid() accept4$packet(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001ac0)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001cc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000003000)=0x2) accept4$packet(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, 0x0}, &(0x7f0000003080)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00000030c0)={'syz_tun\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003100)={'team0\x00', 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000008ac0)=[{{&(0x7f0000003240)=@hci, 0x80, &(0x7f0000003600)=[{&(0x7f00000032c0)=""/15, 0xf}, {&(0x7f0000003300)=""/95, 0x5f}, {&(0x7f0000003380)=""/216, 0xd8}, {&(0x7f0000003480)=""/228, 0xe4}, {&(0x7f0000003580)=""/41, 0x29}, {&(0x7f00000035c0)=""/43, 0x2b}], 0x6, &(0x7f0000003680)=""/246, 0xf6, 0x7}, 0x2}, {{&(0x7f0000003780)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003800)=""/110, 0x6e}, {&(0x7f0000003880)=""/239, 0xef}, {&(0x7f0000003980)=""/141, 0x8d}, {&(0x7f0000003a40)=""/207, 0xcf}, {&(0x7f0000003b40)=""/238, 0xee}, {&(0x7f0000003c40)=""/125, 0x7d}, {&(0x7f0000003cc0)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x8000}, 0xe0}, {{&(0x7f0000004d40)=@ax25, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004dc0)=""/250, 0xfa}, {&(0x7f0000004ec0)=""/51, 0x33}, {&(0x7f0000004f00)=""/152, 0x98}], 0x3, 0x0, 0x0, 0xc331}, 0x401}, {{&(0x7f0000005000)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005080)=""/106, 0x6a}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/177, 0xb1}], 0x3, &(0x7f0000005280)=""/111, 0x6f, 0xa54c}, 0x5}, {{&(0x7f0000005300)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005380)=""/48, 0x30}, {&(0x7f00000053c0)=""/72, 0x48}, {&(0x7f0000005440)=""/234, 0xea}, {&(0x7f0000005540)=""/134, 0x86}, {&(0x7f0000005600)=""/133, 0x85}, {&(0x7f00000056c0)=""/101, 0x65}], 0x6, &(0x7f00000057c0)=""/125, 0x7d, 0x5}, 0x8}, {{0x0, 0x0, &(0x7f0000005d40)=[{&(0x7f0000005840)=""/255, 0xff}, {&(0x7f0000005940)}, {&(0x7f0000005980)=""/253, 0xfd}, {&(0x7f0000005a80)=""/120, 0x78}, {&(0x7f0000005b00)=""/194, 0xc2}, {&(0x7f0000005c00)=""/91, 0x5b}, {&(0x7f0000005c80)=""/157, 0x9d}], 0x7, &(0x7f0000005dc0)=""/126, 0x7e, 0x1000}, 0x6}, {{0x0, 0x0, &(0x7f0000007100)=[{&(0x7f0000005e40)=""/4096, 0x1000}, {&(0x7f0000006e40)=""/45, 0x2d}, {&(0x7f0000006e80)=""/153, 0x99}, {&(0x7f0000006f40)=""/156, 0x9c}, {&(0x7f0000007000)=""/41, 0x29}, {&(0x7f0000007040)=""/56, 0x38}, {&(0x7f0000007080)=""/113, 0x71}], 0x7, 0x0, 0x0, 0x5}, 0x800}, {{&(0x7f0000007180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000007280)=[{&(0x7f0000007200)=""/79, 0x4f}], 0x1, &(0x7f00000072c0)=""/3, 0x3, 0x9}, 0x17}, {{&(0x7f0000007300)=@can, 0x80, &(0x7f00000076c0)=[{&(0x7f0000007380)=""/165, 0xa5}, {&(0x7f0000007440)=""/136, 0x88}, {&(0x7f0000007500)=""/133, 0x85}, {&(0x7f00000075c0)=""/48, 0x30}, {&(0x7f0000007600)=""/179, 0xb3}], 0x5, &(0x7f0000007740)=""/170, 0xaa, 0x40}, 0x3ba80000000000}, {{0x0, 0x0, &(0x7f0000007a80)=[{&(0x7f0000007800)=""/75, 0x4b}, {&(0x7f0000007880)=""/226, 0xe2}, {&(0x7f0000007980)=""/242, 0xf2}], 0x3, &(0x7f0000007ac0)=""/4096, 0x1000, 0x80000001}, 0x3}], 0xa, 0x2000, &(0x7f0000008d40)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000008d80)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000008e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000008f40)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000009040)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000009080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000090c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000a600)={'vcan0\x00', 0x0}) setsockopt$inet_buf(r14, 0x0, 0x2f, &(0x7f00000002c0)="1602598473e10188b172095c1e24e316c532e615e6fb08620b707831deafa28b417c7ea49da66de190fdc14a22659064fea2502deb6c3caed131a9630b42a9d201b2112c63008cb5b005f6821dd754f10d60557f3f27be166668986f6a7d4b5b9451e7a536bd8db578c5b713b7d5c1f1cc2da44688eee82e713b6323f28652ec57fca615e1d48395316b8f80e49bef44711b3b5040e59f167262a3e8f2441447bcf21fec48665ea93765b8604d303d34e3daa4298f5ae3a11c8d5217bfba137c5affc6c839adce8f516b417a82aae814dd79da662be9d2a2", 0xd8) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f000000a640)={@empty, 0x0}, &(0x7f000000a680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f000000a7c0)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f000000ad00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000810}, 0xc, &(0x7f000000acc0)={&(0x7f000000a800)={0x4a0, r2, 0x300, 0x70bd28, 0x25dfdbfe, {0x3}, [{{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r4}, {0x124, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x52}}}]}}, {{0x8, 0x1, r8}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x4e}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0xf4, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x69}}}]}}, {{0x8, 0x1, r16}, {0x144, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r17}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffffffffffffff52}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x4, 0x2}}]}, 0x4a0}, 0x1, 0x0, 0x0, 0x8080}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:17 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:17 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 4: mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r2, &(0x7f0000000200)=@ax25, &(0x7f00000000c0)=0x80, 0x80000) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000280)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) 2018/04/13 09:12:17 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2b00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:17 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)="403d6e98f8762f21acdc3f", 0xb, 0xfffffffffffffff9) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/29, 0x1d) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) [ 273.959081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:17 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 7: r0 = socket$inet(0x2, 0x2, 0x2000000088) recvmsg(r0, &(0x7f0000001200)={&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000011c0)}, 0x0) bind(r0, &(0x7f0000e79ff0)=@in={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000280)="a77d90cecea9a1580dd9330747fcc704d7ac140afceaa150f5a3636a36439517bf6f952fe0abfd18822d2c783fbd863827c897e456003cb6bc53889946ba68629bec186af3", 0x45, 0x0, &(0x7f0000e81ff0)={0x2, 0x4e20}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x80000001, 0x8081) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000000c0)=0x1, 0x1) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:17 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x33d, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000001c0)=0x8, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x5, 0x612400) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000200)={0x0, r2}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) linkat(r2, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x1000) r4 = dup2(r0, r0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x250804, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$KDGKBMETA(r4, 0x4b62, &(0x7f0000000000)) 2018/04/13 09:12:17 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:17 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:17 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2f00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:17 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='tasks\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) dup3(r0, r1, 0x80000) prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x80, 0x80000) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:17 executing program 4: open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0xc000, 0x3, &(0x7f0000ff1000/0xc000)=nil) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000fee000/0x4000)=nil, 0x4000, 0xa) 2018/04/13 09:12:17 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 274.263010] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:18 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xf0ffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x400002, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1, 0x200040) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x4) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x400000) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) personality(0x8) 2018/04/13 09:12:18 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:18 executing program 4: mkdir(&(0x7f0000796000)='./file0\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = gettid() socketpair(0x1, 0x80000, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x14, 0x80000) sendto$packet(r2, &(0x7f0000000040)="83025bb9e78e52bc16dc2a756ba320a86fcee975f4992975a3a910c615440e1899681892f3379d65627722057a300caf76bf75d79ec1b99d82a0fda599ace0e3dfd99df230e72ef1b25ee92c8cbb900d14569b9a63bd229dfce3aae1f61a21a04c4e7f1064a407ccbf11c47d2fef5790b95176a359ddd7a4dec18cfba7c8f0c22a1af98d189f139a2fa6995aa0", 0x8d, 0x4010, &(0x7f0000000180)={0x11, 0xff, r3, 0x1, 0x7, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) fcntl$setsig(r0, 0xa, 0x4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xfbfffffffffffffe}, 0x0, 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000fa4000)={0x0, r1}) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r4 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r0, r4) 2018/04/13 09:12:18 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:18 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xffffff89], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:18 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:18 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:18 executing program 4: semget(0x2, 0x7, 0x71) r0 = semget$private(0x0, 0x0, 0x240) semtimedop(r0, &(0x7f0000000040), 0xa8, &(0x7f0000000f40)={0x0, 0x989680}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) 2018/04/13 09:12:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) fcntl$getown(r0, 0x9) r1 = syz_open_dev$usbmon(&(0x7f0000000600)='/dev/usbmon#\x00', 0x0, 0x0) fchmodat(r1, &(0x7f0000000540)='./file0\x00', 0x100) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x2, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000640)={0x20000, 0x0, [0x8, 0x100, 0x1, 0x5, 0xfff, 0x3, 0x8000, 0x1000]}) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000004c0)={0x4000000000000000, 0xd000, 0x8, 0x8, 0x14}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="cdd45ffb8e2f40d8a4a96b8bdfcfa242ad1c43fd9a105f1514e39f0bc6bd258895ab6f2ad5b6724fd2d3e5f608d4e222ec844223b8a5df1fea9794449915e46b43d838da5da33925e6fb64d28083e1", 0x4f, 0x7f}, {&(0x7f0000000100)="2104b52922cb08c86ea25483901881196d2b96e167222fd0904bf092b729d2f74a7cff73398d51d97b9d62020141996b288b8d0d99ef6f1a30180cd5bec64f1224fa3904d66e730950940a92ccfe627bb79cbe3c24a753b6557583df259093", 0x5f, 0x7}, {&(0x7f00000001c0)="ea7851c68534e895e18545a998ce4726afb62f24a164a8929648b2ad255d034929f1a4b6a2843e47e73bf7eab5c907e7c146c565d98cd4e539d3859fedc4d45c11cc97efcf877f55e963674976cc5861f36c5d9d8f0b42f8f4045e618481e932e9f30ebf0870e071a1de98b30d3925e70eb7f559a19137e631029ea84e61fa2792bd3ae0ab4c74", 0x87, 0x6}, {&(0x7f0000000280)="323982dd8b0fdfa73bdf1fcfff2a06ed305df386ff8d2f4e7560819ee54ece4095ebd4affc70347bbd306b7f33670a74d1bd190e1dbbc688ba2e88e476f508878316eb5c5474185b5540f40006029750d10fa1a77dfd6359c88e323dffc5dfbda5492adcdac87c52f0d3496ad1f027d1489907d9be9ed8bfd8e9f66ecc5bacbc143d22bd8a60", 0x86, 0x1}, {&(0x7f0000000340)="5ae6b92c7fcb7d0c74ae1c7ee6267481f82c52db678b0c50c4a1b7370b7eb2a0b775e2885ffe45f681fb02cd05fdc144a9ec5569e490d0fd2626e2f4ebda30194ee06cb5a4a039420301f5172252cb7197c1f8c005a25686d0675e3a7bc90c59a1edd91255b255da68fb5872224bc43e5ac249736a86b96e340ed4bb842678d6ed1d1c35f5ad70516edadcb307366e4e0fd8cfb059bc3cc229423b4c9273fa91fefb62b2e0a0b292d58406e0eae80522f2823ade5ac7c6edf140a74bcadde7", 0xbf, 0xcd3b}], 0xa000, &(0x7f0000000580)=ANY=[@ANYBLOB="756d61736b3d302c6572726f72733d7265636f7665722c73686f775fbbb65ff7783bfccb4ff08c28a27b79735f66696c65733d79fce43d7e3f6976653d6e6f3d3332397d2d7d313c393b2c0055c34ecc482a870ae379c3b148518ca2a2193c739ba0ced4e446078497c3f9af0d47c6988605"]) 2018/04/13 09:12:18 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:18 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000000)={0x10001, 0x2}) 2018/04/13 09:12:18 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:18 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2b], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:18 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x4], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 275.116494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:18 executing program 4: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in6={0xa, 0x4e23, 0x5, @ipv4={[], [0xff, 0xff], @rand_addr=0x200}, 0x401}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x30, @mcast1={0xff, 0x1, [], 0x1}, 0x37a}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0x80000000, @loopback={0x0, 0x1}, 0x8}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0xdcd}, @in={0x2, 0x4e22, @rand_addr=0x3ff}], 0xb0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)="0202000000008a000000002924be7b7f", 0x10, 0xfffffffffffffffc}]) 2018/04/13 09:12:18 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:18 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x20000) recvfrom(r1, &(0x7f0000000180)=""/151, 0x97, 0x40000020, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x3, 0x0, 0x3, {0xa, 0x4e21, 0xfffffffffffffe01, @loopback={0x0, 0x1}, 0x4}}}, 0x80) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r1) ioctl$KDSETLED(r1, 0x4b32, 0x9) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x428540, 0x0) 2018/04/13 09:12:18 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), 0xffffffffffffff99) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) socket$inet6_dccp(0xa, 0x6, 0x0) 2018/04/13 09:12:18 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:19 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2900000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:19 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/04/13 09:12:19 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/exec\x00') vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="e08d9dc3b6a0679914d354e3e3d8d9ad4e4c", 0x12}, {&(0x7f0000000080)="ea73ba5df39d7caefdf557d02688090fa03febc80e763cdadd300908547c4e10638158c67181b9d8a134aba906bdb851f3ec67ca5749d7afc243151f486828e30fd21cf45d0660efd5d4878184baae6308b089065c17d99ceb1bd5cd2b0cfa4c62780941674266ea8fcb0c39e3995b69d5b0f30f3cad5c8c9931a988c5d309b2fb483d7c9349036691a3541fbf90be7abd0154a7", 0x94}, {&(0x7f00000001c0)="4f4a02c0f33a5334a50046eaf53b1776a328e0000fe1a2a57ffdc8482ca79008d37c4c7da5ace9673be75fa1b354b190d19d1d3a0b639c973c44c98dca412575db7ee143db3c1f6a36502890df698514bcf6d48bac62a5160c7298b47899f8f780f388c35f44783e36d4296e01b4c9510837bd8802680731edf7213c8b7918071ad6aec4be907df5185a7ae2b96e72f68b1a53b79634f2261f6e9195f8a6d1b15fca099645c5f8544eb383e35f8ed2383bd427a647a97a262a95172123c2c23ea7c9c01194b6b595ac5d34d7989bb427a6a7f83bee68c097ab6ba0c7c5c05e9d948303f0099c27bc50a041437c4caf", 0xef}], 0x3, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000002c0)) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer2\x00', 0xc0000, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000580)={0x0, 0xfffffffffffffffd, 0x10000, 0xd3, &(0x7f0000000380)=""/211, 0x1f, &(0x7f0000000300)=""/31, 0xe8, &(0x7f0000000480)=""/232}) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:19 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:19 executing program 4: mbind(&(0x7f0000b65000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000000), 0x400, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x800) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000080)=""/231) setrlimit(0x2, &(0x7f0000e63ff0)={0x2000000, 0x20080000000}) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000180)=0x7, 0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x82, 0x0) 2018/04/13 09:12:19 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffffffffffffbc62, 0x80002) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x3f, 0x100) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000040), 0x4) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c81) 2018/04/13 09:12:19 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) r0 = open(&(0x7f0000000540)='./file0\x00', 0x20000, 0x80) r1 = syz_open_dev$sndpcmc(&(0x7f0000000580)='/dev/snd/pcmC#D#c\x00', 0x80a, 0x400000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000005c0)=r1) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r2 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000003c0)={0x0, 0x8bb, 0xb11, 0x8001, 0xff, 0x100}, &(0x7f0000000400)=0x14) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000440)=@assoc_value={r3, 0x800}, 0x8) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0xfffffffffffffffd) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syz_open_dev$sndpcmc(&(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', 0xb3b, 0x40) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x1, 0x0) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000500)=ANY=[@ANYBLOB="55000000830c000000000000fbff0000a3ec09000900000100001e00"]) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r7 = accept4(r4, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r7, &(0x7f0000000480)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r7, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r5, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:19 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x88ffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:19 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x0, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:19 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x21000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:19 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000080)={0x1000, &(0x7f0000000040), 0x8, r1}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c81) 2018/04/13 09:12:19 executing program 7: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 2018/04/13 09:12:19 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:19 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:19 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:19 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x4007d, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={"64596df17c0e4200", 0x4000000000000401}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x5) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:19 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x0, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x20000, 0x0) close(r0) read(r0, &(0x7f0000000200)=""/193, 0xc1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)={r2, 0x92, "fc8d701a37cebb1d65f511c049ef1316ecd46f293e010f7592f173d52c6b53d1ed0521d38c149df47e1f41ff324c4c94aabbaf110564f2a26d6c0db542bbaf189abba281de09381e9d0dba22721becdfa0a0f483780f3ff98d5688e7e6fe4a79d4bc008fcb53800e5308c093ea3ec01eb3a53ea681dec68d2102f409f50407b4214de9da816bfe728791c3cfad93c109a722"}, &(0x7f00000001c0)=0x9a) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:20 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:20 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2b00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:20 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x113000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000400)={0x4, 0xc000}) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) fchdir(r2) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="abae920200606e835ffdb4e3747a590f25916445f01c79305d17ecceb7"], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:20 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000140)={0x8, &(0x7f0000000040)=""/242, &(0x7f0000000840)=[{0x501, 0x42, 0x7, &(0x7f00000001c0)=""/66}, {0x2, 0x9e, 0x9, &(0x7f0000000240)=""/158}, {0x316, 0xcc, 0x5cc6, &(0x7f0000000300)=""/204}, {0x2577, 0xfe, 0x8, &(0x7f0000000400)=""/254}, {0x8, 0xa8, 0x8, &(0x7f0000000500)=""/168}, {0x9, 0xad, 0xd23, &(0x7f00000005c0)=""/173}, {0x1, 0xed, 0x1800000000, &(0x7f0000000680)=""/237}, {0x0, 0x9c, 0x6, &(0x7f0000000780)=""/156}]}) 2018/04/13 09:12:20 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x0, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6c], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 276.885764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:20 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:20 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'ifb0\x00', 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) write$tun(r1, &(0x7f0000000140)={@pi={0x0, 0xf8}, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, @random="8df05c035610", @loopback=0x7f000001}}, 0x20) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:20 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x6, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:20 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0x0, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3300000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:20 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 277.045462] nla_parse: 9 callbacks suppressed [ 277.045471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:20 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:20 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x202) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:20 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1, 0x10102) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x149082, 0x1fa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2=0xe0000002}}, 0x1, 0x6, 0x800, 0x4, 0xffffffff}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r3, 0xfffffffffffff602}, 0x8) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000080)=0x5) 2018/04/13 09:12:20 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0xb886, 0x200000) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x3f800000, 0x3, 0x0, 0x6, 0x9, 0x24f0, 0x3}, &(0x7f0000000100)=0x20) r3 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80000001, 0x400) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) 2018/04/13 09:12:21 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0x0, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:21 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0x0, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:21 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:21 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x400040) accept4$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e, 0x800) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = socket(0xa, 0x802, 0x0) setsockopt$inet_int(r2, 0x0, 0x18, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) 2018/04/13 09:12:21 executing program 0: r0 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0xfffffffffffffff9, 0x40000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000400)={0x1, 0x9, 0x8000, 0x4, 0x1}) prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000580)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)=@fragment, 0xfffffffffffffe6a) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22, 0x40000000000000}, 0x1c) listen(r2, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r4, r1, r5) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r6 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r6, &(0x7f0000000000)=@abs, 0x6e) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000540)={0x10000, 0x8000, 0x6, 0x9, 0x2, 0x3, 0x100}, 0xc) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:21 executing program 7: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0xff, 0xfffffffffffffff8, 0xc406}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 277.600456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:21 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000000)=0x7) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101000, 0x0) accept$ax25(r1, &(0x7f00000000c0), &(0x7f0000000080)=0x3bb) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r2 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)="887a0bfae29ae3dba580a6a01154410f7ec1c8cef7778bc545c44e0a296b11e253de7acd7c706afafd68b72f2c2f6d51b636d2f94e8968f56e82105a823dd834d90aa7af98ce0f44399b2f2b46c217280ea6e4ad2e63645298ea9ecb0c6c9773a17e291b099a19089bdb8b08be6b7a2dec62dc9e589873097e177804170c276bdcc5504f211fbcb774c8ec8f3ee3566c473dccb860e68113a6ef9b95f9ebd10cb46dc779c5ddcb388d343d89cfb6deead84c", 0xb2, 0xfffffffffffffffc) r3 = request_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)='/dev/rfkill\x00', 0xfffffffffffffff8) r4 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='securityvmnet1\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r2, r3, r4}, &(0x7f0000000400)=""/224, 0xe0, &(0x7f00000005c0)={&(0x7f0000000500)={'sha256-avx\x00'}, &(0x7f0000000540)="0afbb8ef4b702f49dbc518e1b6bcafa9928a6471867c739c64479e092a07da97cbbaec0cb2b2bbc7578f8c5592edabe499427fc14ec4c07c78e791332e4723cd8729c678cc05c6fa66ac1c115e7e7577f628b986f6399c351c72224568853ad59169d54698c8c3", 0x67}) 2018/04/13 09:12:21 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:21 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0x0, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:21 executing program 7: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) vmsplice(r0, &(0x7f0000002580)=[{&(0x7f00000001c0)="61bf9caa39ea8d8aeae9551b1936ea4eab89efa3a6bd2cf7240358aeca9528bc001bdaebcdb512db4e517808312b742a535ec793888bd7ac22e600b842de0a44cf83838ef298d135c688a0f6007a17327c556e91ad34edf3d4dc61b3b2d920552355379ed7dbe51f5b410c0b254c48e8a94f3632aa4203fb39da95f7326369de7731a380e207c7a8f390930f16e08bfbb2666871176c4656ec8e7a706ee6ce048490fa729fba92b0207a9b86f1880973fa6cb6a25a99f394ccabade123c777edceb5d814083eaade07bd2634e208095b73dd61df3686f9eb4d2b41b4d70a31b1a47822d9fc6270d420fc3374084e7781cab27c6128c8357c71eec27f672fa520847523c6297babe67ba6619b0728f00907b5549200f4ff965c6901b55a06dba9658d442e624c0ac817c3aa6a9fcb1800be455fbffa75c5ffd4dc88ba20a7612cd9ed6d217396d0645630ba964022998137ff964486656296c91f6330178e140c6a6a667f606f8257b1ce7f5034759e4cc74d8b4244126172d705d6a3fc4caf9c14151b716814226daf42ec7bcd9a22210a3794825ea069d1c02af3490697f0541324b357a4d64cdbe0f81a7a7f27ad193d7679b14410aca768a0621445bafe71085115efed96d9f8f14a02ebc580070c857a8d7a1ad7786c0523b9879a1968e16570afaa91570f9d54fe2b64f996d72b28eaa63141e93d196d8a4d2617f6d2dea4a1cfa0988cbf19f3433196e062ff6cbfce96885093bc1e3b1bee2806650397b970111c754cd04f2aa801202f70a244270dedf5867c6c3a1ea6d54907aa20536ff47ccac478af69e6733b705c03262e294d80d1c80627f8528e11c7689b29fb40d3aad02f13ef4c801e3a7d6701ddbf965a0d0d3c8c67a75b0a7d49e65c319f68a13858f856edb0c34f0e08cf717602fbdca8a4fd3fc14453b0fb2e59d7dff2a48dc6861a2fd62f596021f4c31ec96ca982b5608b92ca21b742abcc549f7dd06e7514508d2a2f07e974ac87608da3a8c13f83c032f19112d28641354e2f5f7f3e29fa7081e2806cfc9832cf6825151a47cde1c716d7adfc2cce6f9a4ac79a5bbb235d45ecd4995d9309103faf2169cc4a5b442a3a8b208bc5a124545e5850ce2197e29fc6fa71c3dc624fd0300fc176741a4f48a36e371d7b6c5dd92a602246bc49e6ea58f7508d36521bde977e2beb06ec56a492f9f52158a8f3a39f0124aaa34d13a94c74eda39fb42a18ef58a531b19565aac42eaa4cb681d4958443aa424ddb896f5947557f6b06741c15fe5df0e5c76133cebd56c18c4c0a2eaf309e4ff068fd1c3bcda417750d473b50f35916f13bd14ceb7dc69f4ebd913883d82b34d70f0216d00dea7cef3792e042f3ec441ef9b75962ef9c070dbf18a8d40f2ab8bedcb1ecd4545e4154be010fcf715069b7d3ab5811ebb34097f0e239665879293efb24869e63b38df44649efc2f8e1d8d234d4a156997c01fdf61e56faae92721e604a31c0138311d6c78cead56665d648af11fd763f6677e695eae9e999f126e624c4e19fb20c8c1ca7d0566f018c4b31637b28d49511be18837932d46a5ccf8dd58cee305112e964893fd3069e6de3783ad5643d089329be8ddc307df3ef5fa2c2b2dbf7957ed4f5b7a104062687d24f3bd110ecc6817325404f7cc63652cce4619125ac7e273c35c8bc6632d65fc89c713ac62262c6f6a686d5afd77aef99ea9c0b0060dbc946bd893bf83a6098c28ee41c3fa237b545866d81783c749354e65652afb0509f60571bc8e71a4a1225946781ae2b9699b1f24fed5be6ae63f5f77d59c688e71b0da1b8e4a55730c523abf45cb01868846ad0a0139d8e3fc84f4de68562cc85a16576a97e7fe39d5653b1a2207c225225569718fddb1934e5a3ff432093e0f6ab630f1965520fffb339f4c8ebdbb94cae385b8c411b1e0a5d486e8ea868fd6df2a5c829c228543d37a72bd1ffc67951ddd88a89de9d2b566d8f7a5bd99c5eafcc6f8b0d5d0c403f696479f10b554a2eb3f9415390cc65286d441b362629073d53b7c6411ee6faf22158b83a05241fa1a07fe5286b5b6856800315b01b863b0f0665aad19ec4087caba12f5046d02f0a287fc7921fbf3be4a3e59d17547686f7b7204bfb8996779a64781c488a206c06122bac614a7818b89a038e9283bc7bcfae0ebf398a3d4f3fc55530c9ca45434f8669cb32f1677e83649d32ae0a2dbe02e474a1628055917b84e6480540e751688dae258e52528f0e551430638ef5d181937a159927cc4c699e9c76aa9c327e94374253f152ccab8828f234184e893e6cdaa37fa47b0313ffe22f7d4330ff01796ff09be67fbcd6e7b055087502bfdafd62b49f1674b303902db53f8c594fdbc526b30575f747a5316550883ed3aa0756bbd0a012a900cdf1739ea7975ffabf19fb6c3b3f74f35157c2ae2e45293676328a040924fb72fad53af93dea15588fce38c5f386011cb7f8db4e64e12b3d65addf1e37699625e6c3b7f2216f27413d086bdc609a7750cdca6649daae6d369f934347f468c87c4e77813774c859a61f42c5559594e961b83fd9b0f13cca2b210c9544f3062b2bc81645f3824feeac6573486be123dbbdca24d06b3d9ab4f037f1c9e4c9ed766d9da133ea7bb111ba8c6a3385c902f50e7bb05f961ad071241999a1d8fb3897aafc71acd4e691c967f2c3d7aa4492420a43dc4f301602a5fc85a3dfe69a1965635a2d3a62f829f225120053facc9df28de8e9342cf8601f3946872836cc6ac70646596b5918741a8cf7b68e165ce22dc80a2a3ae22d50ff5c68b2bec495fd68c83188ffed802d0ca287530a158ee7c227c96765b555178773085b3dc4d35093425c215c553f6f36756c19a62171c835fb4e5307d22947982f7e91bf311e7f817242ef221f84e0d38dd73f13286f60c430d3ce7a96e88f4f94b525a870263459f1de63e00800370cf935498c5dd713c667106bfce30bd6c674a41c9393666bb953572e9decb3c7bb21f7491d764613658e2637a4c27cff6e8d893a79f2bf5440444d41058f5fe416b473a0036c0aeda0152d600edf82f1be886ad737790dc4e8d385c7c3973556eaf76512510475ed6cf471b0416bc5871fc3a6a57a6894f46a3ef78685abd794929ecd7dc97c281f36738f6f4b9f7266fe58f9d15a0dbbd8e641c8ed5ab7255e4f01d5d7a259aa15ba3eafe1de086282ede69fea08aa2c029ac6b8f61ca541ae6762392f0f4339ca983974c171e59413193ecc28e947331ac803edc2f2ae6a884257487afdfa719272d2ca059d5064ad1749bf62441d4c6bd2be060dc8b881fde8df62eeea9bf7285111eab9b144ea2c7572a61567c4c76d39ac2ac75e1d523318037c0ff9f42ddebc871dbe77789b21fd5ab53a9111df0f90b406a76f198bd5a58dcf4f8f0f87a8b5f88327f1f6cb290f37c109e5f7733618682c7254902f709e23fbb243199ce982b2f855330132ea4722e92ff71bf2eb5b0996a59abd1dd641ab2ed92b446b8902e6ee561c9f7b48b9ac376f55c5b5c0c933e43b4332313ccef01cd07b9ea0fde2291e171e70bacb5ad4a5b5be3d731078156bea43d73155a8ffe7f3e5d4471e9082afed23150561e8ade96165dcae01d1df93df1b8959ae9f10f55a3e462960e3d32e27a41ffe69e5aa09063e93f8d95aa35bc9f21d7e714f9e9dc978d2040f939b256cc31dcf0871f13ba0b2bdec8a6aad33470ff1b421a2e28b4d36d88cfc698700319a8765ea6296943c401773af50ff7640defb586eaed599c9620171a33f6382803e57a9da695bb377bfb543e19a935c6430f22ed82245804d67bc0a399d29d428565f67f5e5423f8f45a985563cdae19642e6c9ed0c3e6b06a63e2f587a82403b6717bc8b63cae6a8cceb98abce5027f4e57b8491fd2d4d3bdc60b255d6f794f21bc524efc438c85349896389d167f1e2ae54c7a4c2c0e6f6b9332bdf05eac5ad55095e50194fa5615c79c9b15d87093598fbaa97ffb52bb3de8efbe474604edf7f8ef0570799e24f68fa1e10a2abc188deca7d4e6bbb82ac60e9a8b3180a8539d255a06c57ef89a573a4d59fd54c92421104cc366baa204ae3ec8884c4df6ea42ca305cd606e0a759469f355ff564af2e00410a842ab109237b2a9e6821a04139043a86fb86d38dde6af6c446246714a39bf5492bacc499e13b6de94f3854d0ea91a1fa34ac95ae8122e2a43e5c7f03245a8927ff962523883738841dd5999590edd07c748c179fd18854dbf0c8029b055f2ec6219331975b854944ea3527719eab1a594c8be3733324f97cbbe026ae8834a36c213c0ea0b6de672e53ccabd24e3e13e0ec6acf0de12ac1e87e99c8f5f6b73df9ffc4829d1a5c702cb974bdd26d51444644437258179944ec518589c9111b0cbbe4823695eee09f70039c1c2dff89995d822107040ead4f921c983f4c91003ab496c3ee26e7abac265228539b6571666b4e4550c862691ed596357be8a2e8551a5de55c948bbbecad6282d7eef11df6ef5524cb24f25308b048adde4f7310fb4f80e5536b0b0eabe00e087b2346808c8c583f56cfc5cff41484126cc5c005d3cc286d61691c09e2b94cbe6f98abaab93f5168e9e9350f722d841539a7754674cb69ce28adcfe8a298d238f016807fecd56bdcdabd92bfb362ee2ffb6a70c1989c8da490c9ff03d8834f4922ac048ea3f1b05534f2fb5f23caec01d60ff0badcf4a4d32b2961c410499092ad7f77628ff436ae2f1f6bc3e72d01cbf40c3a25aa64191917201e22ce925bdac4bb75635a08ff61177b3e75192c9682ba37133bf3d58990907297416b4ff0b8e314ad26f54c49912a03ee7436c1fec2bbad1b102ae65690f09ea14227661bab1373d191fdd583ec1a53243d9ce6c81e9b65db98f2dd9b0d5f91238cde4a30e0f17b74dd27c0be797faaa55868a944c72c9c339343f336fa43f4fe8e4830627b0cbf800052b9c31904babfab4f42beb15d8da8fca53d6a02720d645f9dea5f345672bbafdd60423d5c0718b6bce8bd394da3a285c908722076bbe900a9029b42f0e5fc22cbdd49134321ece1a806efce5c57068da6a397e578bd3a23d34190859766fdc1274170cc72fca1c6901111933da2cea638a19778358a94b508c162393d92b7447ee6effc9c4a55079f7a8272795ce028df8b350e11de4995937ce942550875271ce03048ae71ad6939d9d9b9bee9cbdb20e510cc2e34605ea0f046bca528fe5f566f29c8e90827e63e88eb9574248eee4dd257ba71f933b3ada082e44c9aff64f6750ea2015e3e732efad2702d828baf81ce84aca06756517ebac19852821da9fe823897b2a66e1d63ee75de63bfa7e51aa09f1fbd90669c58b1c596904eab9fdc0a62253764506d1fd6882d83d993a6ef6e5595a85715b4a6bae1285c94243f021147c8f03c7bdd152d250808c0ebcfeee43aaa8c5f3bcf9af4b54f6707f1bfcd080c71debdccbc516756ca2d0cbd629c910fa97a32d5445f624a01a9be12bb7ba47e6225d84a5817f6e15d93be544fe0fc8b80c68b4e2d9aeec3a52e8ddb942a9fe069f10d3d7d508f7ebf4245b3421bc1c36b720045bdb2ca6c7739365c5bdf57833feb89f8478bb2bc3ab8df4e98b37f8830e9072ae6889a53b040f997e8e74d437f35a07e5cd044233d1b5fc6f33a70159f14a89fa9b31fb3b594daa970fbcb5faeb09edb8d137d8d8d457d9248904523292663f885737f898952454195baae8cb962d1ce038320c060fc6be79e7d7707b1c66ae13eb740b779a8f8a6bb7", 0x1000}, {&(0x7f0000000040)="7d5405daf7e6deb721dc490277822491b9bcdeecac41d77a831c788c13e79a1fd3f553c0a7b0259a612dd0ff4a6fd271a7e8f330d5a96a09bbd3cd8bc9ad2dece6ba082e9823d0cab97a55c33dbc3fdd4e52e1ed8e35ab339e2338fe1101d2a0fdea2a37cf6248aad1ffc250b7247b27569273b3110cef11516264016ea839c8e365813d6d5dec45d9a1a07dc94fd66dfc8ca703ef118edebf9cd6023bd8fa37c248b4e0eca610b0ccd0d311277741c4b554d7f4611c9b98678358086e3d37ac8b410c201c9738cd962af60b5ca661c977de310fd8c7d5a3a32a643ccf8a", 0xde}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000021c0)="6a198b7bd33a4a54e431e3b851092bcaa4dd91059fb962ffa749739bff1dcdd1d55fd6e7581c0a1f0aeff48b61cc4dc3921346375c8e158b13196e3268b0b22dcdcd493d9a51b793fdf9b2ef669f01742716080e62d357b67bf591add113404cac080f4af44a373c97d8daaec0eecfbef0c7ce5e837a24e0a7587743558feb8b7575e894e3d913d339ff1d73d2640687ad03f8262edb0bcdb5a9762a70f370f191ab50498f50f449bb4600d6a180dae411d9835fc9cd1bafc17ac796ddd22c2aaadfb5bd06f79b5b833dce307061135efc9b0e8a6530b88b7fa6860965f0552a629d2a50ace7c1c965d19e2ff2c0e435c6", 0xf1}, {&(0x7f00000022c0)="2e55f6336a0d918d9b40e0c734587ce63826d59393bfdbd9dd5ba8e3d9d432d04d9abe8dcb28fe4ab852d6b4190e5477461e35428bb54a4442b34a58089d00f49d53c7fae99168ac140d88a41f089216658ab093d23b461b2f19001cbe24e011bca3256c806a21f829cf3815e6c4beb7325513dc3d710c4026605434788649734c34c2962fde7a0f6159883ca7ab3ef6097ea63951489decf08fcbf77686325330062fa5bb405e7325002488", 0xac}, {&(0x7f0000002380)="30ecf140cd88ced6b1cddebad891642f36d1d5b7fe4e6b98cc491f4466d50ae70b4a6a1cb1508292392f40696798330cff8906e0fa23da5f72404e76f413d5616adae7790b4c703ab9d75b536d5186a75813b359c56af07e8a5b0059f1492e1964ec481d5eb20c4c87b7cc2ea5e4a7fe00470ea99b4267a7abd19e1a59e0cac8aa14686b63bf99b2e8aff2323aff6402369326da0cd1f9156995d29c7c5ec04abe8fa716cb16499dec46a50d47b2981ff36aa18d15fc8260dcd56652e5f187d8b05be5", 0xc3}, {&(0x7f0000002480)="7a51b14ed94a33fb03b9c355c457ebb8138386e4a740432e2609d75d30cc683fe1a01fd206712ea74ccfbaf275539894314c6bb7cf55a142f8c443d070ed81bdc2a3b5f24edac40198af90cc3f4ec4988404c3675f9ff2fa243d6d3e80c520ef3ae643727a0a0d1425c5d2b569cee44192f7db0a7d85d054f30da9f4936cdff4ce5cda7de612b37c7cc0d85a9008c384d80119b0e3484fc35fe232f8a1a2044d0e26367e60fc8034d55a089dc3b515380e7487131e959f5acf8e87b4bd4e0644f7c6a475dc41ff2eb8dd66d734799823ee3f4038f114e2876461022c873f0d9bd537cbb498879380b12472f6ece5", 0xee}], 0x7, 0x5) recvmsg$kcm(r0, &(0x7f0000002800)={&(0x7f0000002600)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f0000002680)=""/169, 0xa9}, {&(0x7f0000002740)=""/93, 0x5d}], 0x2, &(0x7f00000027c0)=""/49, 0x31, 0x397}, 0x1) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 2018/04/13 09:12:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2b000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:21 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) recvmsg$kcm(r0, &(0x7f00000022c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x2, &(0x7f0000002280)=""/8, 0x8, 0x7f}, 0x40000101) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000002300)={0x1, 0x3ff, 0x6, 0x75e, 0x7f35}, 0x14) [ 277.848814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:21 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x30000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:21 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:21 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3c00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 278.038776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:22 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:22 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() r0 = syz_open_dev$amidi(&(0x7f00000004c0)='/dev/amidi#\x00', 0xfffffffffffffffb, 0x18000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000500)) socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0x35) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000640)=0x2) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f00000005c0)="44dc8f7f11156c6d9ed936b163", 0xd) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000600)=0x6, 0x4) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:22 executing program 7: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001100)='dummy0\x00', 0x10) r1 = syz_open_dev$dspn(&(0x7f0000001180)='/dev/dsp#\x00', 0x1, 0x4080) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x80800) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) accept4$packet(r3, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001280)=0x14, 0x80000) sendmsg$nl_route(r3, &(0x7f0000003f00)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x2008028}, 0xc, &(0x7f0000003ec0)={&(0x7f00000012c0)=@bridge_getneigh={0x2be0, 0x1e, 0x4, 0x70bd25, 0x25dfdbfb, {0x7, 0x0, 0x0, r4, 0x50610, 0x4008}, [@IFLA_XDP={0x2ba8, 0x2b, [@generic="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", @generic="e831a8d441bbb83629d5ddf171bc58688ad68a042bb15876082f0711cc4ac8e36e2454e4232a418b7882f6fde6a59d6c8d6bbd891b5074f4bf3ce35f", @typed={0x8, 0x3f, @fd=r0}, @nested={0x1708, 0x90, [@generic="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", @generic="92399478b4d5980b118ff143da0b8ae75c8d89640ded6ddd49912db3fb54ac83c7211d77a51004e6063a93a23f750079861745c8f2f8548d2d0b617ca5d6540877b800163aaa04158274246939bf68c0c0d031b049df7eca0364dba7c83943a43a991e42c1db6f874bfe489b163c4bab4fe6a9f50f89b8e79b9a5421c9fc054a349bf07990284cf95f1586912239831effdc4511f8810c9b3fc1542b6215681d0adcc224813ad9afabf972aeea2b27c96aeffbdee9362f6f416e27f9351b1e5c40e55813004efdfe2f4c5866627088882beef21b947e2936b8aed627a1660ab2182e9934e35ae525b5", @generic="73947bf3751c3e9e531f9fa6add9a00a877579c1991fba7bbda3f7eb70f0a438031abdb92b4df1cba189b38a7dcde75aceb1968e120de5ff6c3cf47ea99359102120a891a6f163a9f0280602ccabd80030ab328994d68c39882fdbb4c9c44a64e76285ec11428b3dbb6c8068ebd25d704e5dd0ebbbee5df8cb3df0ae906e92a055049f93a1408ae1f6be73d4e3668c2a1d66d0aa90c71b02b63e0370abb5387e62f883f117fd8c62faa4a3e470d6f4930db1c9c4148587dc8e9611b2b0d6c6b685df9a702ec305ea0e5dda5c79e72c5864e978432c72a139a927496c61f6b1b7834d3f0123c36500c608b2c29c72a09e03704e8bbc", @typed={0x1004, 0x5, @binary="9f9c7fe01859ff6d09fd6e6bbd8c9b30c2c5e5a8695867a722ce4c3521bf47acfd0e366246dfa35b455fccd3235c0e8ce6b82f2d71e49598c3962e17572f3b7a43962c45518306cd6cfb5df0708e166b7ea627f048815affcb874bc8890ec42f08169068e607c24c5b323fc5df3279cc4b1725a6ba3f13537891f7dd16387cd8452c7945536ae6381b3940be218df4018866b4bfb830f1fba57a0e7708cba01de057c2d6900efa0acb317c0d31de54b600fba91713c70cffba265894402e53757189954536d1bc0d6114168b7e8eefc984d5094d05c7c67de5255bc2824294b095c72ad668b1c3610fe506b5177ab38998749c133df528120211d72304c3d8878e4e6702922c9052217b575d9a3ecc1fada97942059a94d81cb4f6e019a7b7c3fa2cb5e186528f9717633c732e57da66083ef38f76462ea15975ac253a86cd961512a722490662bece7b44053ff995462d5bc5c57935deecf3214052e5e422915ff3c3668f9ba0faa67861ebd211843ef0a2354be3a3aaba38cc23e4fee24c3785766517725cc9c6def55fdf37e5e91267573a5e44c0a7dbb7c4cd9acf42ae9c932e581869a858f8fd7226e7773876d3a7752d4e10193dd6be94f5c6721940d9a3123e3554ce348d67a6f9b6058e8c23612d78f33e010facbcf182a82bd3938e5c2615942ffc863951c88ce7ec9fa9655b268e45d81eefc7d2ba9a3f337a72377baf712976389accf672e8ccb61174a14ba2d3efdf21c2a105d1521d13201e678fdc6d7f2d13f86e34969c22387e913007279f571b3079d804785aee2bb2a41a672b02588f3c4fe063f6e84cc33df61c21d194da31908c9f53d7ea20bcf68935e2ad3bde1e79a2e8e9628dfddf8114e457459c2cbff743c2c8f2ae82ab1abd824d27057b2b87fff01a05a046400c6f33f0b5a4d7fb07f48c5c0c0db70e73602ca8939d8be24b8e14d615b43e28e5ae2c43bb1fa099c3a72380483ab0f53c687fe938dd1456d3669909fe5ad4f9ece58cf1c8b9f9756822ac1e5f8310ee8167d150da72cc5e243a2ae6fdafa43620d51bf511e6cdc421f72bb3604095b38dbd8abc1dfd1f54d328baf84ec7cc1e8831733225c685f1833855f34f0728fa0a87e62be0e80ac09b2f24b51b5dd0ab03e9a33c99297346f491dd948f581e65cd2f27f731fe0708de9188be0b2d7268df3c3d8e043f404eb84e51f23b19ec109bc4846a89d32707c1e3ad1baa35855f891536df5cef4178b251bf9de043a7a597440f110d27227e4e8f5a260566ddd98581c5c040b67bc259285966c62adbcd0da3844697d7eedd5ec5c308a1124cb0a4b98d876e5917c0c038813617689a224b770e1f0621af3c39be4e9ce1340dc1797b59221f83c0b7018d9e662ce258b745236a0356df2b553e2e00a27e3fbaf5d793ce298a39b78c06fff2eeb4977fe7e4bd684a4e294f761c1af49eda47b8ce2a6064ffea6c0d3892aae74fee1539e55e62d485705a1b542510a0fbed050cb7872ee813a4d3260cd048eb1638c489a33f9146ca522d596fcd2de3a6207745bd0f328a4e8677d625f7a56443594a61ecdb16b7ec002eb679e98545c3da07d0fe843d10263e79b348ca62e87f6dc748a57ef0a4134cdb1d547021865539037c2537c74c37b0644253f82793d380f391907ea0e8f1c39945b7113a8c4f4e13ee18c32ac556da72087e69fe189af2c2cf423ada9c3bc34c779063a822e4c315471b372fce54bc32e0a680fb86404b64df287ffcc880279aae48b7f2a8a4077323652779141fa82ddb324acb8b0daf354e2e55033c62c7161b021b1ad608a2f2c0649611002369efc2121e409a3dd98a3df436aa4a9cddfec3e09f2bb3e6a9c20e26cbeb539c3e69cf8377d22f007efdf38d1e597ec28670314b47fa2fe8c5ddfba9785a8757b020f17a67f9e144e7b62ad27a9aeea84ba5cbaa4eb29eb20a2668e91d4e48dcb3861f3ab13e7895ca0302da856b68f00f483a4e78ee1804dc3e734b8f222d3e3dc02211e64eb516ae576949545ebe7d35b86c21e481e59e01f25c70ccbb2eed3004e8fd06632dc7683b2389dd47944e2a0179ca611719c3cf7822585771b9f82a04c52ae2224502276abadf604741dc7bdeb12e36db218ca7283e65a945bd0937a25d087010586fcee2403108abbfacf7960b3af70dd32d20fce6f3e7e38baabbded6dc3a9c51ee703d150bdba5310645182cfcd06cdd7b71e74bb77090cc69209eb6c46e3d92e0c9027a534935eeaa7c69bf0eb27874ae3f39f2ca20ec8209fc3dfd384b39e8e38044c4df66e1a5d681ff960e945c97bb8b9f845533df9ad91458de5d5436018cc8440cc74bf1d4b937ceda454b513a659ad7ba89096d7e0dc435550a97630450c866e1b3ddd5ec7f6b962fef3ec9f4d68df314787cdfac45f40bde64c649c43fe962de388784a82f1be77dd1824b2708ce3839a8c6ee6ed2c8dd4a442c4a96878b181ea148fc8406d44859364b68787f05a390f1a6ac7ef240bd32aa56c9aea27f39b8bc05923680a27c5a6f43fd5fa682bdfb035bcd01991e0015753810a7c6efef3f20cd841e4ff7336f3a855c811403b8584d3baaf9ed3925bfacf857ad28df500fcbb33811f304cfe66db616e29954ec67a1cd5d5597d8589b09d93d8523e38e6748ce5d4e491f1740185222428bd640a95bf167050ec54312b44f2f997046c994bbff7d7b77d7d8387d89081dab4fd66ad7b39f8e1223065251177a51b8638e64d8e28730057df6809c04c64cca2ec30f5a0d652c9d9f5d1196e8200ddb8cb8c68f136b87f7ebc0b62c1665fccf65524cfb87cf615bb53b212e10fbe1f20bd113bf132fdf7d1b022cc232444e73c5fe64adc3763ac1c6f6593f84017e27d66eede550652ab3aaadde162b3b68af94dcaa8578338067848a7a60d270c4c7e2a546d94bef1c2c9b98ca778c52d4773f12479692867d4953bc5d515dcb5fa87fbe97b9947c8674ccea54f5871ae354511db5b9107041489661d7577d0f85b17b941d6f4d8c094c2de4929317ad6aa520ca814e2b5a070928f6f47ab5a310b3c8ec4c8400226d4a27f140e3202daa0b579180044bcbe69b168d9ca6bb1ce9e6adc92ab40ca2490a7ce31504c98b2991f1555985c565912c427a2ecbd6edaacd0ff2a3763bb23bad9d356ca6f27fdc997b100df96ead449c4fc91e0a6317f1c414711a98ed5b89982a8f806c804a617bc9c65b1d2c923ca3b3700dc326369516d9a6b14282b0f5a657f6e6980879d70c1aebe769c4fdaa1ebf8811a55fef7b52127314310921639b4e025bfcacfa7893001b4d0dc7b9c2e409e6dcf6c123d95f8f5db49093168d5191acf2a9bad54a644c10af3e66126fc732fe94aabf36bc638d09daba4b47f0e4c5f0d11b54ddb6076e7698793d4f26284c4359caa4bf745a955feb4ed34aa9ff3c983079d736b8136b2139872ef90fa670e69e383bcd55895c675d333d5dbfeb6afcfb53bd9db53dd3146af7126139226317edef424faf0c1f599d28e214afb044829381ed1879810db84e94de41c101f1b0e9bcd58cf022620fcc0c77ea251b748847a71380c3409a7f48cd377b6dac9f7ce197e7d203c40a2d9f3ea55d97ba9a330d118a7301c3dae901bfa7af4e9404698cceb9165563c5e17afbd44cf495df75b5270a5cbfe0a45e6f9b016b7c18d770306cf88dec846414db613da637dde735a80f3b0f969e5ef40a7806ced75348eaec76aa39fc20d339f600a390c61a741115c0e627e5513f388e53eeccaf756e3f51a38b18a598adb44fe4695a7bc2c117bae61c7936b46ddcf57dd55094fcbb9aea8d4536df38d103dbce04b56edb91c5dc25521e22a6a712206ea37ea5554c42547962424e30d2f184b8831cae6606f5ab049cadf5cfd7a0a8c982e91ed7a638fd4925fecb426d593c4eb74b8be9f232940ae97f9747b4e21418d85e863ba9112f02c3fc677009c433556f8186e98fb481aa221063f41a64b264a3368ad935c8ffe3ff344010b67d603d72e25debca700f7f4e95afd074d2dae9a818e8445ffd80193ffc20d352bef65cf68a03a6a857dcb1b65909b64ac03107f37a4aea4ef4f9cf46d026704510368d28fb742f492e83f5f08246170bbba2bbfd4eaf85a385b774b06179f8c4536998745267fe77ca3cfd9e04aca6b4fbc2169e2b3f84a89e0d7c09f6d8c611216d899362a225a9ad44a463909b2b49814141e0737ca1d9266f9b5b0e82b0b082cd6cb594626a451d5da856184abca76b6ac207aa45fbaa60c050c311088a2ec2ef7b132be85a70d6b2d47fde113763a7e16b48c6f2fccf906acfd83f09f3af111551759749f138a564eca0793a3a8574bc46b7a8a3e9017ca3c3fad21c834db78c947852e6ce5bc849edfc78b54ec904123e7e34e34e9bb42de40b3eb812df41df52d4cd345dcda6a5949a023cba529b8c2ed86437a32389efc383b91e14e4eafed6658a34e41e5b0683424794005947cfdd3c76907998d6fd3c0b45e60bf886b67607f2e38efb59acc2d06f421e5633ef6a03f16a3f6ea836348a8a8911ba8f5c00bdd50826ba50ad498ca09536ba1b9973576bb6eb109524eede60b06f643f81e4d2a78ef0b3eee656c3415fc1e83fd5bb386509d1aa96c1e9c1fcb0f871f64fd31c826c07126446ddc9fac57567243fc4cca728a4f55a64f70b5f16e33a3f75e520b7a284c1abb6bdeefae6b106cf7fb8d01bec95338c1ec72eefaa0c2b092c4063650faadfad814070efa1f424f5810f7e962a8c0759126febc8ba23a80652c98a091dd6812fbe1664a3866cf4f459b7b05a08dd6efca968900172467f86f0fbaf5f4ec758a43412d3e7ae3878964ea10cef6469ad1e3f05b883574a7eba8442c099625ae9a8564bd1bb155addd3705f8fef36438b7b72ebbef14294dd4d90e6f5079813964a59ed8e9441d4d1ec974f7a07bf571bb320f319b210db47f0a8c26fcc9b0019938a15702477bc2b06fa7f33812c31756a6396b83d39241551d84a0ea063819be69460ee6da264f3340dedfe5c0614a520e14fd3a1c1d797d4add3276ecdd15239ffc787a78a60657c8056599d587caa314712cb70aa9633d33c354c328632b3913575df79ac517796cc33eaa860b90a9ffd45527879cfb61371943a67f19a62b92e924dfd001eca89719b907d06ed67ebff96556e97357e0a45ce4ff94c4182d3e849e2cb3bf8bb3bcda7a453485044fc682ee4f06afcef052bc7f4f2bec032f70b3b7e6dd1214e91f80277a4e8fe0e168c61898acdf59cbd25442cc34d03e9300f0ceefaab952f697b684b2caabb9d860edda6aca825becfc2fcdaafebdeb22136633aaeb36a2217cee539ff4534d716d0965a562f7043e17d0271160f278a222c3406fa5b905704bcdb3b78dfd12ad21b1feb777f5cf44f34cbc20783c06553696df068d87bf23148053fde59de677728dd273817eea0e66153fde78d0c6b91880a532b3292d6098f759b560430c9757bf67190711d48c669e9b657b0731e517cc74018eee1f3f6d83d3c630ce7f5c7b139f164e13a5d3f6f92523201c7991ea8ed903c1f9d05fec215ea3b8f7fcda19a17398cd76702e87c300db3fd28fec53cd81d85e48ff27014aa5e1f7fc5194466f70338917a27a15a830c947a692dcd2df1050ff7c1e9f575d69f35a1bb009399a00d61402b1b1f652bc799f40260d198e1c454e421bb0d71cfec3e1898fcf127eee692f83224a6598e7e9c5a2fdc2d61a15170b10d44b3400df2a85a9aa3fc0eea25488e38dee7eab1e2d48c"}, @generic="bfa9b32c4b50498b9fafd2825e9e73854683200043206c9bf3b7d2dade7372f28c99019ff542f59b6694d42a180376cf2840478d4f47e3ae539d15fed7a0175dd5696413f5645256b46845bc6b5593ffa1506901ef86b5a1c900ab0a355e21f48e39e17bc446b7de96c82fabaeacf9e030745d3bd2527042340f48706d421103167a90e5", @generic="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", @typed={0x14, 0x7, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @generic="870a0103261667b7d2be89e18b5944c34ba8407948917ba042b31e38afa93181c817d63eb59b722b8f1d01da1a00fe1af4bf7e394b748e44ae005e6b44c529ff160843b15be4e319d5bd7c38e8fe3ba11e01b6be43453b92338541701790f50030deed32dbe91da0b565add0c836735a94fb23e04f43404097a371faacd76453175e26fdfadd078518cfd290f1fa940c26bb3a7d0d1791db74b877575d02e898cf142a068f0c91c8ffc91247ebe3ebe4d956a13e54ec64808f80057df59f348e2977c9dbfc8f36516d64a26ced8532dd30ec2c34b9755436f4f9cf67f157ef808d91fc62ea7dabb579e3bd785b8f61e2d355683a5fff93ac05", @generic="2ee866c13111f0d7b157af9ccdce3decb8948ef65e9aff65557dcad0fc8e29df758afa942c4d97c62eea5b7b4c4de87d59a4376b6243db1cf693313b5b3acbaed4fb3072783092d1aa8da99d8c1f6da17c47dba38ffbe692af29004af3432a8500e40acbf3b6565161a64b8aa5843f23f05f67a9f535364936742608a0c7e78f26f59af7b9314099ac7e07040f821a958995b4dfbe60b72264e3a5100429b90a8ebafb10de560c0fa3f5ecf79d1fb7c2e7662f8ef488c871c9acb562fb67637b8d", @generic="10f8bcef09bee4d251ce2c4948a7a93174fb55867d57e06c2ffaf4cb6818e798338c3e3754c4fdce94b25ae0279b4071b161fc629924fed86d91f273029d1848d20465a05ed29d6b58e9106ce7d1ec95fcd430972251e13fb2c29f3f5fec114fd7420be91adc9e4140c50cfb8772f78c4d6eca797d2c91645a51358553a276eddd5bad40490ec5c5ec19f1e5ec55e5b41308fd3b2da9447903d9c0a55a094162ad91fe0ca916e1d2087c25b5de45a75573332f9fe3dd478d3dc4bcefcc21e02fc0cc73ebe4a99fb525a2a2028f240f8fb6386b8b0e3a"]}, @nested={0x298, 0x43, [@generic="0212130648fc7acd8062a209ca5b191294154f54de87207dde90ce53dc66606de2baa35ae74d6ac7a8372bb101ae07d233d80c3249ff7b75c3c9d921acfbc08f9af9506484dcf83b018ae5c6fd240e546e094b4ee6a072860b09b8e210331086dc678c6f2aedfea27fd8dd57ed81f29f7343ba8cc2532cec5d67050c1c60160cc5b02d2659a34ea3542f8dc592c9413c0476c45e6e12923b0f2cfd5277f2851e49d1b4f729e20b4718ca9014b584494345960d40ddbbcb83b5da1fce521717c603dfaf93dd46114841c67939e8ff9ffdadf7538a73e7de61325b9a40d9d9d4a30bfa5d8a3e5993", @generic="1593048c43729ce86a7f16e4fbeff15076fdc09788bf48091518b7d850d5720f6aa6365524c6ce94c13d0792efbef806628613964fcf69e676f69f692ca4bc0280", @generic="5b95a32bf11780efed32af385e214bf8673813cd858b3a4e0ffe8f59526ed58cb92047bd5d330a94e021f50c199fc10e0264607dac403bdd3d913ecdf01e129e28984e4d3139248de86506fa6631c9c491ea5c634c787095a4fb18a7afadb54ed412624c2d8406c5d249981f98a5ac2afccd7a3bca895c3da64596ef549893e9a4e61aac6ad9", @generic="9c3a8ccc2e2dfd564ea8e6f4dfdd4813b49422c2f1bbe813ecf69b0201741df8d4e78025654a37d7e10897113028b527a36d2de30c386627426e85788a1ba2b3e510ab94b809f26a9e20dd327844dc", @typed={0x94, 0x1a, @binary="bd8437bf5d31dc2a96176974e89903b5c4da3ed71ed99a6ce3ade5a72d690983fe08c9533d2da7f161accfa20ee94627098e109ab7361590d4b1c88231dbafa0a39edbbf4ff0537deceeb40403a074bc325bc4a630846261839716e4fbda219779b0d28bc85b5a1c220c20cd84730b0a53f2a818868e55919d31ab68dfd197c5c369959678ec0a68c4f2c85ca875de6e"}]}, @nested={0x1c0, 0x22, [@typed={0xc, 0x95, @u64=0x1}, @typed={0x8, 0x21, @str='\x00'}, @generic="95c6f5a4ce7517e3baaf1f9dca926273b7330a34701c992edf52d2", @generic="23c15ca4c3c14d037445b72f8b73db58cdf58042bbf037d06a805bffbd847014227ca16c27eaccafa1c0493c5336af342d1d0f33106087ef01a58fe3fa3bad706c1714056e791df0105151748897b0ac1865b1bffc3accc87eeebe81020c147d5c9208add108cd32763fd42e525ce310730d267eb32506e04bae8819b99bf8a9b9b793989fc6c68d5795ea5a27664251f498cb3820425b67e61e2a7a", @generic="7ef0a771f4f5ff171fa23bdb54e008ae364409280874c104c9fb53f7604709aa9248f4d0e587ea99c116609de86296252c69e6ba464221f7e0ed1da7a4cb1fdfe88305c58e675f027f406de503f43cbece7fe03f23af5baac9dc49ac7f4109f92ddfdbe44cd8054d18cb46e42d26e45724c9a8c822760c596d9b1af2e22b59ed16225651bde901872724", @typed={0xc, 0x39, @u64=0x4}, @generic="7ccfed4793a2de96290dfb5847c5f4a9b2f36177f6e63248736e8c32fe43619d16759b894b699f47be488d67e6a0a8faac8b2624a8447a99f5e6aeab60b61979c72f49c698f07dc043ec520250c807de1d1790fdc44a587c"]}]}, @IFLA_MTU={0x8, 0xe, 0x2}, @IFLA_EXT_MASK={0x8, 0x1d, 0x3}, @IFLA_LINKMODE={0x8, 0x11, 0x10000}]}, 0x2be0}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x102a) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000001140)={0x758, 0x0, 0x2, 0xffffffffffffff7f, 0xb86d, 0x0, 0x5, 0xaf, 0x9, 0x5, 0x9, 0x8}) 2018/04/13 09:12:22 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x1a, &(0x7f0000000040), &(0x7f0000000080)=0x4) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r1 = syz_open_procfs(0x0, &(0x7f0000593ff6)='ns/cgroup\x00') setns(r1, 0x0) 2018/04/13 09:12:22 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r1, 0x3, &(0x7f0000000040)={0x26, 0x341b000000000000, 0x8000, 0xb80}) 2018/04/13 09:12:22 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2c], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:22 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:22 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:22 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:23 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3a], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:23 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000040)=""/197, &(0x7f0000000140)=0xc5) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000200)=0x1000000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) [ 279.310593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 279.328580] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:23 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:23 executing program 4: unshare(0x8000400) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) iopl(0xffffffffffffff69) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, &(0x7f00000001c0)=0x80) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000c00)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000840)='/dev/rfkill\x00', 0x101, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000980)=0x7) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r1, 0x61e}, 0x8) unshare(0xc000000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000680)=0x4) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80000001fffffffc, 0x83}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000340)=@pppoe, 0x80, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/246, 0xf6}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f00000006c0)=""/75, 0x4b}, {&(0x7f0000000880)=""/85, 0x55}], 0x5, &(0x7f00000009c0)=""/199, 0xc7, 0x5e542a51}, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000740), &(0x7f0000000780)=0x8) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="ddb7c9f85387995fda830870c2bcb79f2b9e9401dc57eff706cb03985193b9b694878b9ada1c64dc0d06eef073e1b159a5e0dee4147d185ddbc502589297428e6ab36984c5f2b12b8e88758715ad8e40049c5781c800a9", 0x57, 0xfffffffffffffffa) r5 = semget(0x2, 0x0, 0x40d) semctl$SEM_STAT(r5, 0x4, 0x12, &(0x7f0000000b00)=""/253) keyctl$assume_authority(0x10, r4) getsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) fcntl$lock(r3, 0x7, &(0x7f0000000040)={0x0, 0x4, 0x3d0f, 0x2}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)=0x9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='user\x00') 2018/04/13 09:12:23 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:23 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x28e5}, 0x4) 2018/04/13 09:12:23 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x600000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 279.468338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:23 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = epoll_create1(0x80000) r2 = dup2(r0, r1) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c81) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) r5 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$sock_ipx_SIOCAIPXITFCRT(r5, 0x89e0, &(0x7f0000000100)=0x4) ioctl$KVM_CREATE_DEVICE(r4, 0xc00caee0, &(0x7f0000000040)={0x7, r4, 0x1}) sendfile(r1, r2, &(0x7f00000000c0)=0x9, 0xffffffffffffff01) [ 280.004706] Buffer I/O error on dev loop0, logical block 0, async page read 2018/04/13 09:12:24 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) r0 = getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r8 = accept4(r4, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000400)=0x0) r10 = getpgrp(0xffffffffffffffff) r11 = gettid() r12 = fcntl$getown(r5, 0x9) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000067c0)={0x0, 0x0, 0x0}, &(0x7f0000006800)=0xc) ioctl$sock_FIOGETOWN(r8, 0x8903, &(0x7f0000006840)=0x0) lstat(&(0x7f0000006880)='./file0\x00', &(0x7f00000068c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = fcntl$getown(r4, 0x9) r17 = getgid() sendmsg$netlink(r7, &(0x7f0000006a00)={&(0x7f00000003c0)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000006700)=[{&(0x7f0000000440)={0x238, 0x22, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@generic="b15952a8eb336f0d0b1c3813269fdb08209e230a76bcad541ffd3722dd5d9b69b90cca7c1510fa6e1d385832c39de0179e1dd0e7673625ce46dc1aac8138f3717362be7495d9b48fb9d9fa0b3fa005af84c370c877c700cfcfc1ca171b84d4b66dd786d3fb57502194accca53f8eebaa46015ba718beabea045708b64e1ff54ee2205c8c9a5b26b83fd123ecba2bf0754863d88bfbe86f67fac101581a27c8f9a013ecd6ea759e2ba5e84ed255339b6d7fc938e4529fdad2836a6fd488852cf50136ef35324601fb38c68eb5c2f9cc62707055b31c878fe38ffac645c6d8256be15a7afcafe2dfb9cd89ae0ebdac8609c4d8", @typed={0xd0, 0x12, @binary="477295bc2150e86430837e101a3f3a9134cc53710d1343f28a5ff8b5610f24b85fdbdb0cf4d903d0ed2d3f08cd16e9eb50746d3be8e7ed153db5bcde6e4b23caf8f52fe4e721f3ddcb9186160796a843f017384525af46766f41d0d869b530d78ececf6568c9f23514742431540e80ff6f8bf695a2fb7fa1f993152085756968e5ef10a46792a755c67ac7d7a329891237422e63cc5ac3aa9e7b117fc295d06b7074ae35035d1b630074539ee4146d9defd72fffa91e78f78ee7331529e34548cc776fc813cd0c8fc091f51f"}, @typed={0x8, 0x70, @pid=r9}, @typed={0x8, 0x19, @uid=r3}, @nested={0x54, 0x92, [@typed={0x48, 0x5a, @binary="fe0fb2764f1126e0e7ced72348e19e93fb9ba58c8ad8c07d91631b43501c5f0700c084dff47b185b19ccd971ec34319a4f85d667764cb2e76b8cfcb2f76b70af6ab062b5"}, @typed={0x8, 0x3c, @u32=0xcb77}]}]}, 0x238}, {&(0x7f0000000680)={0x215c, 0x3c, 0x2, 0x70bd2d, 0x25dfdbfc, "", [@typed={0x8, 0x2, @fd=r5}, @generic="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", @generic="6bb68d43619fdd20f75acd5c5d7fda497c4777cf98122525e33fbe805adca0763f40dbff2b28e6ed5c05fab6ef", @typed={0xc, 0x5f, @u64=0x4}, @generic="ee9de536e409c07a1258dc96d26d4e9c84e29a7dc876fdc6d6f4e3de56ecb1294010903f3be569842018be60bb1222ee3bde47947cdc004f70e1031eae2421d1d10b661c1c66bac27d43ff997fa74972447bb78fad65a65bc216cdeb8584bba91f7cda6f67058654d7cf007bb696eed2c362959840fd869d1afa99b7b4", @generic="ed61a7fc2df78c5d20540cdce3728f754bdbda1060e679c6e23356eb4c88bdd90ec8c844a5cecdaa04910952eda19988d8dec7a91e4a3f3c754ace93c2944a2ac7172e58d911095ee391a295ee36389e927edfd46f89408654d17c3a4a7acc4aab8684ed13fb3b46c36ceb68e33d9214a63ae0c018909140319489c437ca0aa84c07ee81372a8bf8e4ddfe3e1451a794bf65fdee77f9e13937d2da278ed8d420fb6e6a91362f3b7373648315f207e80bd31f626a8f16983e907f91ee3b4503f96f8c256990eb0203d89822afc1fa3a8c5380fd3fff9dace1e24af01f7ad4b8ea1c47cb96f92c6a7f9ddd10bca680dcba040d77254e7d93de3186ab5f418d481cfd48b7490a3354c4ec2ccf686057fc3eebe0b43eabac308630482eaacee53cc376dd5e13bd3fbd7b435c8425f81bb68d43dee064e59db25cc85dfb1d12e0c0ca0256c8f550adb1c1729eabc1cf3af4f4a8593bfa089b62e5678a54f6aac3d8d74da56a1b5c3513d4145931925d8755295c7de0b6c69ccb609167e2a43f97ee42ab60bdcfd91b50c2e6ab002c155191af6a1723000c6658b39df47977d2b7d6e12d839368a5053c43d914f3d1815c34329fd6b8e6d9adffd385998a6755b18742e77395a2ab6b15c366776deef435fcf2d620207451e80f10079f1195b1a977282a38b7e148bf17bf3abee0c28cc9713dcdb7c5940cf7f2407381bb66a858a91dcb944db30ab701b4f7efe66672647b83fb44dc33250a83c5a5ef4a7d8c8228ce4951fdd0a5666fadca2fe1ad521757813e2e6d0c79649a809210480aaab4c5d5091e4d47696bf2892bc8d8b2b401b3842c98ef09f2d64accbc0b555ff6d645e256505668f195f9823a736737683a3823b228b6ca01d6fbf6086a457e1b1a6064f124c185859346cff29bbacf46d820c621730adc191958c50cb53ec3c15f7c59c7986ffd1215c43b443f8a68ae0b55685f0c5802f2e58c9015554f3d4c4da6dfb924c4cce115f4c24071016ea4e7c52e7dc834ad333cac4758f03ba5b8ffdd48fac5a2589edce1f4ee06dd25e6583e378e27262eda29f94e9115e56f9b61e96dac3849fbc4476a66a5f696ad6e91637d3c2efeddcaa2f5923489de22ac755dea1021ae6d1e270d5b5ec79f0c77c70f7b4f4691fc6d514851f8ba4e5b820b0274c80ac46638e4e3385da2cdef8a876fcae381439bc4fd4a2410d7281a3ffc1eb1cce3e2f93c479a36f98b74b5b7f31431c20b8e0215211c2aca681e351da5fdaf01113c7309bf513f538d903e9ad2a8a442d289a72337f00f2cedb9cdb006a3221de9685a89cadbcb64b8760dfeb55425b30293789874fb2cc69835342b86e2a30eca28b43706baa0ea47e8acc5a277025d99da8a69ad76862a22154005922a718e3a970dc983fe93f2581c50f74aae485f1dc5aebef6907ee9677db0ddbc3a6bbb2190cc34176dd26385e767cbcf948944651e23a9c41bf0ff2f5eec5ff5d44bf1d1d1a949e0665c09a177d257a867340b3195ff562e3815fa6f5c50b6eff039b40728d9bc8510830fd97ddb24f349cf2b8d9ed05e2b2456b91809754734a43b5e30354e53c6b14213f73d9a7eba8019f5a8170704bf0c402643080138e0c25d83c0dc346984cfe659ab16714d74263bdd6e1db5d7a43fe44f9b973af360a7b2c39019f21316c11bd7059f6dcf648ad0bb0cf25a31d49697d7b9186de34497ab750a6b840e92f635a02dd09d6f64a994ccc4942a8a33fcc20b2fc504c7260669271f1f5f1eb07d6822e4f25b1925594be49917b02721490b48301cdeb074a375e1cf1ad8c38332d4be73d02bbb33259a77132382b1c0a88228b2c334b471af4dad083200389e865c61019d03d425245113257f04e5f527be4c454730d135f162f9ad8933dc3723261bd89443a9f4277e60da360303b5d4a298f548183d0e61f50875886218c991ca4d50c67707aab2e1695d0dfff14958e6cbf219ea0fdba5913ba315362f121b6a07c55080c8475c12a414bd4a86b1d6c7a1a807987c4fe9ee46a1d55599bbdc9d861c8b22c1622a8a34062bdef05d3ad2f2ff1fdf6aed1556b49d062fa1cb0b90224b6fcf60f8755ab6040c80a52abcc19ebf63ed436d14aba608389ee9dc7350509b6e60d66fcb493bb0c643970ebfaa55dbb1a362bc4876354cf4a07b02ecadc4bf3e1b93049957787447b34cbfaff86df3a8fcb29ed73364a0c85b896b6092c9105f88d62c740ce788939baeae25b17e7642a396fe96b38cab334988e488191769953e7a7f7e507fbf5b482a6cb60d8e99897200e45fe2a0f0a66a1a70883728805c14e8d198a55a2698322633b991faab3c266ddcf6a3b33a0656e057a5618743c47192770fb1c2d0a36b64682816da64160670b9801019ccee79cf9734e5a01f842c8cc51f157ce4723380be1195b69092d257669e89bb69557fa4a29f4eca30999e9aea070bffcba50befae0c32d32b4da7b02356f81b933875057411166db430b0626aa9f119c3bd104229c1c2ece8d661c07d228ed954a3da59592a96aff5498007ec8d038328a725751299c367dc2c225f2baf0e61e3f8554643f550263d9118615b33a3f7f9ca538f862e6cc28e1426afdc959b2c07e7b24b2b16479571d25bc8ef497a4ca35c5a6ad2f0d14a334846b21ef55f1f9a971fcb5c4174815fc545a5257ed7f6c373582ac2f2b0e9ecb41186981e45ad8d27d0d0ad8f1a9298af104b922d0ac9323fec4c0715f2a6cf7396a783d9095e4c0480a3888f44ef6fa8bffb9837e1eb4fcff12fa33acddae938c23aedbb278a04478bfd12885ee57d089a7d094707e6c86946c8fc886b40e31aa97a407b42af1401d41e0b1914f724ac15ef0c35fa0dd8ddbf27db3cb3bf744dac004c59ef93ee1957cb1fc647df770b98c4eb08569405339338932c1d96cfd4b36e1d4241a08a5749f180a2bc0fd6ac8d1ad58566136d649d800204940f892bd4857506d9ab3098b32f02d67f0731efeb967a26d14bf24a7fc00bd56c234714341811667ec74044d85d577fb490884fdb4b4c756dd3674ee4df7b55ae68295b77e37c59e377be1ffcc48b55bcc148758a3dfaa406cd4128d57ff65e0e91d43b450ee145bab5fc7bc7d1d4212c5c3c0eee1625d459c8ba942eec5a951ede78e1a8a35a7bd7d292b9e962b7db624d37fe2093d292164e23376dbeb6a3830a22a3767673adfb42ed1f499e6e5e0fae0555ad2089f13e125280663d4621f3780e2b1dce701c4ec6fb52ad565cc1dcd343a1d9722061d5d306229915dcb47cd8724962ff6274c3bfea84d735d8e1f64d306e6e9d7528420c459547f8fdb276e85c7e5cb070cda0f94ce36912911872483f398e3f2e67209c6840dbddf1c5c267de92b068b8080026eecda4d9eba285626cc81c20a614eaa66f65b9ebf61be690bcaaae07fb5bd651cbbc9427d4cc7becf941bdd3161f50dd4111ae82f2f7174bd66f2467d395d00db5f37401963df47f63300435585c915d1257e699c1a56c60a483c00d0b84f4f460d9608b2dcf177da3be86ce2232719b45eae4ac5568c54f024884b9b21840a376f4081b4ed0361bb932ee08a47e762d82da6b51b36105df219bfc31fa924f8a17d223eecc8b106221ce27b50651079d96ed8151902a9cc60b05dbc72d47ecda1a9120ac9e3b9af9e10cc76c476a5b8c29304dd4bd4322da68dae8ae19b7d7560d1ab3521211aa9b94726e68e56ada79d70b0b454e45d8e796ec39db981dfb0fb5bf0bfaa339a4397277579b710e9d0559810538050838543620363963e7b574feb8573a8db32abd3d4ac4838c616e44b5693c972c68db0417cec732d9f0ca8175f541b15871ff483ac1069e8da4e0c35835b37fd602613c949849159bd624d2a2ebb43d197536f4af80ce0c8279585b4244b9dbe0db3741d91aa1032705a92fbb41ae700111290dc48c857f5eb9e681cb4c73fe7a5c620b56ff41cf4d5e3473a94aab4072e0bd41ed10b12206545b091e46bf7e84ea698944ca718130de249957804f392cf377d3c52c99ae5a43960f118850d6502145bd9d58823b1a42ad49ab72cebc33cdf1272f16fb71a058ca2ad77357fa73068ab9c7b141de843431d6cb846267072b181b886f5e593c6df001324fd5e8af20111683d476ba1035ce878a31b6dd1afb5669c2a5beac62a6f3fa0946b054ed049b863b99fa35512d5bbb281f7cceb09eb11b3ea60df59afa8c33c151d332761ad9dedbeb2abea78dcacf90fc0e9f225b64ce05b1b9ef2a857d93385bd6ab580006f39f5e87c96859ca2317d76b8da75cc8308296edb82378e3eb4069c4a168195d007de8f359152fc69b75404e093b6fdcc63c5a34992cdfbb46cb90e46de6de4162c5ae1dbda6fa48bbe37ed1ed4d9b680c47cb9894b4a27a69843c2ca5a1f1427a1b4ae54cc79ae60d0319a49ea7873cffef8b6027b99070302317c3821d38ac13c22c48f504efe2e2fdfb6223858469ab87ee6748308cd2c7c34cd5f291a3f2232164368ba129470b9352fc73234a1af3234a41bd256cc1f7b8d80674203cd5be43ab54d8643afc0115bc98c36598a030f9a901e09f2ca632c63365cb14888547077781a612950942f2cd4b766b1a544b5533869bcd44932350963413a75bb09bee3cea1dd6dff97c4b8f96635f83bd433d64e2142bd69e7f8d546e98f68360e0ff49c9c7a8eef958e1811a1d13686297c2838781fdf5f21ed029bf240b9dab715e856fd07050b15e317fcdfde21cd3f0e393bba036fe558b009c5ab2c984dc4127e9cec09a5dd135ab32ac2eb7cbff0606a1c94305ad1cb25a77171efb099293fe315bae85ed04197acf573663db7a9923744e4e4a60f90128bc79e60eee0dad75f970982654252947128602e60976b750bb1291cf38385993e3284c956907b74ba6865bffd3b56d6a87943941126305d53e1cf5302f64d3756cb70cc9f05167e23a888615d10272b7289a6cf62ca30db765d1be1302973b91c8b5fb977c31d720cbed97d09bcc1e5507734f0ffdc47341ade84dc3cada03c2fce38468fb0af8dc389934418691c69f0a231f36a89e9f860d3f64c23521bba9b4b49138ec463e82ec412e0fc8c5831bdec8e280706bb02217759956eee3eaba082b26fee80f734f6b5c23f900226d636b2a020e91b55fd815a1f2397d49129e6fd4154814cc7ceffafade72cc4892f2a880538dd8cfceed32ca878e4134cfa95e3c3d14a43e3f474131f448931cdd80f9a9c68276fb55780e8d243aa0bea96574b827f4288392013507da2cb5463c723782d0d3d269f742abcd3fec6f03d8842d09b272ee2626311d3421e4131161ced78f3c91329cd8564982b812e798c6bf8d1b2c0fe850c572eef173e75b0e2a8e8d3bd845b170552262881203929384f65b7b948be5bc081e96854c87c0cbefc05bbf491c082b03a2de183960e8b958f904d537a7bcf0a51708b351facb771488f52b1fac8c389c7109880f73a2ec151950f26f3d310b5aed0d354c79506a2f79506c8baabb2c4cd7317f87f99780b0c2d20321856f71b5a9a2dd4ae033d62b94b98ce77daaac8e00777cf8d465eb19bbb2cd8cf139492e545d033bd7409f664f775c1e5ae89521d302e167f39e1e1c7adaab724b5fb8233e47cf27820bd569dc12a26ff2f32f8a33ca790d874868a0b48a567dd9666567289d5a522df0897da7dc636d8eec874a9a806b7e81de14391e48be9e2b9edf12d1c6e1a90d3810dfd945900136869fa080847fc0ab20b4a10eb6dad1424c68bbfba8bd88e6b8ff", @generic="94bda6efea91473b8bb57ceb93405b7767893a6e700d3e2a642d0a635a71809370cb644bcaa70be8c6c754910709dc3df0c29cde6458675fa158aa3fc1411d8d9f026d01a54c07d55af81653532c2b5dd5d486b4b408857165c10e8b5d1fbae5f13ac9240ef7c2e8079f7f01ee7fe0484bc4d4c4e82e7a42a58bc099e906f883944efd5cea6b46c9f75929"]}, 0x215c}, {&(0x7f0000002800)={0x14c, 0x3b, 0x200, 0x70bd28, 0x25dfdbfe, "", [@generic="d9b027ea83be701f842ea9ecd9d0da5b4835dde456a934539af225e89462bf33dce31a7811cc2ccf8bcb74b4119dbc9432c80e411426f458205fea1c4acbe27653916c842ab918a1d6885fab76f15d27d99087ada3ab44ab67c8e8aaf8e991842b163d06abcc151cae7b5d70c88d4d6218ebb3f8", @typed={0xc, 0x16, @u64=0x6}, @nested={0x28, 0x31, [@generic="62bc9596181636730c3386baf072a4ea3ec4b79c99212be7290ac3e38d22e2b8e24213"]}, @nested={0x94, 0x49, [@typed={0x7c, 0x1b, @binary="39016bf71676750b67f7510c615a380251182eacaf0256ebf2d17f09b7d7797b1670a993eaa3aada06481533b632150cb71f73e8c6ce548cc6622975b66833152b1a3b7bf7b22e6698a595304d709600267d51c4ea960d16c1ce1e9fd788b09d2efc2833c90eab39027460a6eeffd26c33685330ba36"}, @typed={0x14, 0x11, @ipv6}]}]}, 0x14c}, {&(0x7f0000002980)={0x28c, 0x28, 0x300, 0x70bd25, 0x25dfdbfc, "", [@nested={0x25c, 0x22, [@typed={0x4, 0x61}, @generic="c66babd789de979ae8198c396af1af2582035f8f9df605545591c115bd07ced803ca4c70e95983dcc72e2f7879585dea3bd0423156c71ad2bb51ff6e429ecd4c239d8bef74e1604dbff6814bcbb529043a64eb935b81e3c162d50ec63d8d927200f2b365ce03d5b564c9b9d95bfc58efedcc8ff6ed60d32456bfadd3732dc3fdc016017faf8cfdca3c3ba47acdc6abd10781b445c69087386d78503ab5ab1c2afbd7fa792b6c6a7e5fc7b33b8ce7163acbe219a264bf2b080b1d52a8f757b7528c388949930adebb8b7b2ff8489b7e5fb242dc4c983f5b5e5d8213daf8", @generic="940e6fb0e0851ee878c979143c6fb6cf3adb468f14640a485bad5f6eaaaf785ab4441c7a0794982002a27c11ce0b7c0a72f933ba189e058cf309787755b4bc919cd694cc13c7", @generic="2c1920c134f92cffdd5bd31e8d04c7872ef617227141ee6e67e68038029430ef6acc5cde0b2b1baf3c893ee830b7a81317b765c3e058531e3901ab131035f4fdf8d26a7460ef4f08970bca9c420f083c1fba2b7e463a1ca78a65b021d58adee8394ccfb52c0f06104801a8718c3eb52123d94f41778f8f282b11d1debd4a515d6dee8a3c20a232a070e361717c79cbd897ca0454bb94c63d22ce0c74e3c8e3e084996918a0eaa1f637138f92a93d94eea088e717bb83452e07cea2afc1b411c691983ef434a731f8c374075676b56b590fcaa0928e34a16547f1085e3204e2d10c4b8d6ad2e241695f7d1eef673b8720d40faf7a21", @typed={0x8, 0x58, @uid=r0}, @generic="8a21f469617daf06b5138c3db10d693432961733cff0112dbcf2a926cff6694c2c35abe08b84c63b2ce9f2", @typed={0x8, 0x1c, @fd=r2}]}, @nested={0x4, 0x1d}, @typed={0x8, 0x28, @u32=0x1}, @typed={0x14, 0x11, @ipv6=@remote={0xfe, 0x80, [], 0xbb}}]}, 0x28c}, {&(0x7f0000002c40)={0x12d8, 0x14, 0x105, 0x70bd29, 0x25dfdbfb, "", [@typed={0x14, 0x75, @ipv6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x10}}}, @generic="8192cd18bb6c48081ea28d580c96dc9dabb7f8b6c21c90737ad0921b56adc38c8bc7e34c943336f9228a17cc4de9105ea309f23da074c1f414330c4a5687a9c900837eea55c78a3b100024b442e422256f79f3a91028cd23c7024fcc574af881ee781d2e70ae6f17c8d2d26df22c1ec36900bfd5ad1a4a739abde375ba1fbd844d67844122ce3f7bf1c5933e9ac0a517a7ed434afdfee54c384d5c9d52d2b8375bebba142bb1230cbea9", @generic="d61305a2b1eb49db66523759b79edecec46c6f38d17428268228e6a5052d82b9a4c5ca9fddd26af3be0d6b97b0fb45859b9a9f286f2dda20a6417aed15630832865dbe9a02f5bfd37d88b57ca5f8d7a88d071e9b39301f72f4744f6efd4ebdef6c3bc9510cf87e3991f626f157ef5d0e39a6e3aef3b9a0274f5a45959ea9e15cce3c52b4b7d8b52a527e88578f79a1086d8c43ff13ec54ae1ded8dcdacfe109f111b6f0722", @nested={0x1108, 0x4d, [@typed={0x4, 0x2c}, @generic="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", @typed={0x8, 0x84, @str='\x00'}, @typed={0x4, 0x11}, @generic="653d8f2e80db8857cb2e0994c2b22f2cc7c6a35b0991d0f35403d8342fece304e376d6b05fda8ae48e31d2389ed7939db49aabb2f2a82af6986871bf4c", @generic="ddd6c0245408a58029d1369da4144a43deb60e8736c81774c0b5f131f53511c95ce1233dc7e4cce9e0ce9eb0158cb93e30cd27115d3fdd4f970fbe8222de3f1cd9bc77543d555ebe9f1423c5e12a9ef4289e60fde2976373448b4a1e3918b073a808ed1cb123da1d58023223528a4bd53d58a7f9fdff1e329963a2b5656860e19372b6969f64570f15123f43f7266db5b564c881ec0ea1a6a524e05fd519ffae73a2f9cd69faa945f862415808", @typed={0x8, 0x4, @fd=r4}]}, @generic="d301a4fb8c132be43c434fe5a2a2afe59760727e35157374e437122ded87738a9162ce97162defbf199c9154af30087cf890fda2670adb0e076b30298712266ac8c2c208a51e9ab5430cb351759adfbdcf90c822d04bbcf4c24b0c5c68"]}, 0x12d8}, {&(0x7f0000003f40)={0x21c, 0x1b, 0x408, 0x70bd2d, 0x25dfdbfc, "", [@generic="b79281393fd1a8ff1d853e63a113cda30719155b6dd6fe61eed826ac24df088fefe0af5a95a83bb0ed0aa8dac84defbbf219cbf486a8c08110eecaa6ae6983dfa346834a9e7ecdda6550015685e77ade5f9381ce86196ec04bdb3bdf6760520106b69b", @typed={0x8, 0x50, @pid=r10}, @typed={0x4, 0x86}, @nested={0x154, 0x39, [@typed={0x8, 0x76, @str=':\x00'}, @typed={0x4, 0x7c}, @generic="772620e7a10fed86b08423b1a419474fd219a016b65101ef285be6dda79be8ca82b194c2b5716c43380cf606b1ffcc987c19173a66fc5d29da65c91c37858e951c8cf4b6d6e958a9a5f24351a0e3c830f9ce52d76c09753b4b2f36d3ea849aa7477cd7cb12d31a01a5c7f2312efa536a94594f7e5a7cada33a238d11a42f7279047e6890b97ee4f103e327d5aae68765dcd7ab744d19996c5c84b418c5902a19429f9866446a9dbd9eb05a8bfe6dab15aa99dbf48b25332ba5aac492d418b587466242f3ded4cba8ff08414d2dae8dc0720e7b7283ff71783ef1", @typed={0xc, 0x61, @u64=0x784}, @typed={0x4, 0xb}, @generic="afe7d329a55b7dcf62d03092e20ce9475e2bdeec2d06f583bd1e8328fa18059c9d912c", @generic="3812252fa5b026afd5f1cc5673f1d280240dd1973765655703a4ab8b2b1b2573b1d08e4704c1d986ef8ca8fcdf492745a832aee0a4e6"]}, @typed={0x8, 0x55, @uid=r0}, @generic="fd0d37dcf2853adeb4fbce4d66f291e9926ee9c37debef15b6a0b6b719d127e6a590b7b796a87c0b19b77c1db87640d251dead5a3eff55722882717c4bb1"]}, 0x21c}, {&(0x7f0000004180)={0x1b0, 0x1e, 0x300, 0x70bd28, 0x25dfdbfb, "", [@nested={0x134, 0x50, [@typed={0xcc, 0x51, @binary="e574f38fea0daebe7b8a19bce4f663a2b7fc888f623142ec6ff2f00a3e642a51c8c3a703d887b2732e2ad9675acdb1365764172302a71a884a7b37f687c22231a1828c9ebdba89c5f718f30efaa217ed34aba85f1e4fb43a88f598cd6c74899f4a009808e8267a747209754184e0071b5135130cae9a8a532fdcdc40c93a922135a7c89b5c7c4301bcce539582b3d46516d45d5339c4a3cbc4e93c41ae2ceb829c99e4ebdf78db4fbc8f48be83bfd236caf588749bc249846c2ecdda1cb477fb014c6eacef3c"}, @typed={0x8, 0x41, @pid=r11}, @generic="de85c1ec1c5a2569af0a5b6df52d307253804de9177ec42b4b2bdcc9f0dd8ad51837aabe4f386811e59c3ffe0a3d98b0e50fc88bc9c89bc939d095149b53368d0afd90cffe3cb0a055f25c5c2f0f8b564fa901e7ef781e320146"]}, @typed={0xc, 0x8e, @u64=0x200}, @generic="a1ceadbe2ad55c8ecb30aac4d9cb6b47493805936691f9148f2b258f0dc8a56fa5d30d4b82195da8cb79c7bfb1fa0f7a686e7203f0f1b481cf3e001de73654f5082392ad0dd2ab477b6893d3a7878983398479edd6be7dccda01b3658a"]}, 0x1b0}, {&(0x7f0000004340)={0x8c, 0x19, 0x2, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x8, 0x4f, @u32=0xe3}, @typed={0xc, 0xe, @u64=0x4}, @nested={0xc, 0x77, [@typed={0x8, 0x13, @str='[\'\x00'}]}, @typed={0xc, 0x7f, @u64=0xfffffffffffffff9}, @typed={0x4, 0x1a}, @typed={0xc, 0x93, @u64=0x8d}, @generic="1ec5b2d9bbcebbbd940036601ba00cb5d550378a371ab8bae9954fbc61a2b7027485c0ca0d9515b7db4295767e211cd1efd94e0d6e22733f2339aee7", @nested={0x4, 0x6c}]}, 0x8c}, {&(0x7f0000004400)={0x22a0, 0x3b, 0xb00, 0x70bd2c, 0x25dfdbff, "", [@nested={0x21b0, 0x77, [@typed={0x8, 0x8c, @fd=r2}, @typed={0x18, 0x47, @str='eth1+keyringwlan0\x00'}, @generic="25c10b71d87e56266b08d3ceab602a04670bee812f4e1b1465d7303b3f0c2e17700d5045a5cb39173e9cc3dcfa6628968236b5db94052f96f4c008bae7812ff39699ce14717a368400c96aae7f3dab7cdb2c03fa034af3ba87204d6bb0f665e561dcd38cdf5cccccb1e2262f0bbb7a7a355f71d8", @generic="697548b778a3389aa7ea16e3fdaf41", @generic="3ae548a4b8d82032377f15e17b992a92958c499ef875cce54e20ec2732b67c2c5a69a0be5dd5f9ec3cdbec737f7d8ec5160adfcc75ecc49b093c540ae49c67c1ee221a6633e72b9ee8ad54ccde6d73a0709815cdddbe7ec6d95cff1b3bebf2abed42845e905ec00d93c2cefefca95a887fe5de19e28e65962515b7db2a487107911cf9d0e2fe47eeed81bd6ce8f8bf94de0bc3bf5f", @typed={0xc, 0x54, @u64=0x10001}, @generic="aa7f04e1f7cd2f4e729cb78a9a9a77320397369c3ff38d010a74ddd9eaacbc5cef67ff8a26f1237336e18ef0ead26853805651adb78bc380ee0f82961f07a631cc6d0b252182f6de9a3df85ad9833c27dbd2bdba", @generic="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", @generic="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", @typed={0x14, 0x1e, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}]}, @typed={0x8, 0x5e, @ipv4}, @typed={0xd8, 0x86, @binary="e80df817776e635199048b5554918fe72cd413e4240fa508a738f1c71a7a8d1e20854913959ec278063b9ef58288f4388322158706d7256b34683bb03a8b512b092e8dd2afc4fc818bc06a5ecb8ce55094519fb22518c43d7e4af17533d236eda862ffc49c374f4b465dd79d7b14260671fc99c5122c55e80f0de297054d15f85f9e71cc0cf57da1e4e7c32cca217f945f5350476d95231cb22024bf468a2bf59ab77ca26101c8eede71c8d68e0d977daaa6db261c35806dc43602567a738aad75de716faa295c7815569c666ed17f3fc84b"}]}, 0x22a0}, {&(0x7f00000066c0)={0x18, 0x1d, 0x20, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x8, 0x79, @u32=0x4}]}, 0x18}], 0xa, &(0x7f0000006940)=[@cred={0x20, 0x1, 0x2, r12, r3, r13}, @rights={0x28, 0x1, 0x1, [r8, r6, r6, r6, r4, r2]}, @cred={0x20, 0x1, 0x2, r14, r3, r15}, @cred={0x20, 0x1, 0x2, r16, r1, r17}, @rights={0x18, 0x1, 0x1, [r4]}], 0xa0, 0x4}, 0x40) sendmsg$FOU_CMD_GET(r8, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r8, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r5, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:24 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:24 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="39c51042c4ce0f52000001001100"], &(0x7f00000000c0)=0x12) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x5, 0x20}, &(0x7f0000000140)=0xc) pkey_alloc(0x0, 0x1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) fcntl$setstatus(r0, 0x4, 0x400) 2018/04/13 09:12:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x109043, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000080)=""/49) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x800, 0x0) 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x6c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 280.345045] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 280.358971] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:24 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000000)=0x3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x0, 0x0, {0x2, 0x3, 0x9, 0x3, 0x1}}) 2018/04/13 09:12:24 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xf000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:24 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x80002, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffff80000001, 0x20000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0xa5) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e21, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0x6667295}}, 0x1, 0x0, 0xfffffffffffffffe, 0x1400000000, 0x1}, 0x98) 2018/04/13 09:12:24 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 280.555119] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:24 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000400)={@mcast2={0xff, 0x2, [], 0x1}, 0x8, r0}) listen(r1, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) r3 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x8000, 0x7) ioctl$KVM_PPC_GET_PVINFO(r3, 0x4080aea1, &(0x7f0000000500)=""/107) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="d5ce414f2281863b7b566c96da13204331071e74ddeb530c0682b0a40c9d56210532f7b960ab579b612454e01e546dfd8d50d184a6e89d358711b7e56846bea18eef2d9593e91d2efdb7"], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:24 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) set_robust_list(&(0x7f00000000c0)={&(0x7f0000000000), 0x379c, &(0x7f0000000080)={&(0x7f0000000040)}}, 0x18) 2018/04/13 09:12:24 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xfffff000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:24 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101, 0x80) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) setpgid(r2, r3) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f0000000040)=0x4e35) [ 280.853476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x32], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:24 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x10000000000000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x65498d346a1fbfbc, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/13 09:12:24 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:24 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:24 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x800) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000000c0)={0x4e47, 0x80000000, 0x9}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000080)={r3, 0x1}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/04/13 09:12:24 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 281.044247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:24 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2f], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:24 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 7: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x800) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0xffffffff, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x220401, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2800], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:25 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:25 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=@routing={0x32, 0x0, 0x3, 0x0, 0x0, [@mcast1={0xff, 0x1, [], 0x1}]}, 0xfffffe5a) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000003c0)={r0}) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={0x0, 0xffff}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000480)={r4, 0x5, 0x10}, &(0x7f00000004c0)=0xc) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$VHOST_RESET_OWNER(r5, 0xaf02, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000600)={0x6, 0x7, 0x8000000000000000}, 0x4) r8 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) bind$ipx(r8, &(0x7f0000000700)={0x4, 0x3ff, 0x6, "40484bf8ed47", 0x1}, 0x10) sendmsg$FOU_CMD_GET(r8, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="f989406a4a1d12ea5427a84e32d2c97d4541c5277f0000003319830e5f777559212a7205e34519ed84541cdb9fbcd08ef9f03e7b6f36984c9a950be501938a74ddd5cd31ec647fdabe6380fdcc56428a7405fb1e1a252d74c289e633529039588439c84343e50a3ebbe7365f9668bb13b2fe5470ec51792ebe72f56d28445959d11504bb23e613d0662d698cbe62b0bcfcf60612ccde34616ec11a99846e763cd70feeb9cc19b02a4d7151369086aaf86c"], 0x1}, 0x1}, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1e, &(0x7f0000000500), 0x4) connect$unix(r8, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) getpeername$ax25(r6, &(0x7f0000000740), &(0x7f0000000780)=0x10) 2018/04/13 09:12:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}}}, &(0x7f0000000100)=0xe8) recvfrom$packet(r1, &(0x7f00000000c0)=""/9, 0x9, 0x162, &(0x7f0000000140)={0x11, 0xff, r2, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) mq_open(&(0x7f00000002c0)='/dev/vcs\x00', 0x880, 0x138, &(0x7f0000000300)={0x1, 0x10000, 0xfff, 0x800, 0x99e, 0x5, 0x400, 0x22b}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gre0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r3, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) [ 281.476448] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:25 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2900], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:25 executing program 7: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x181000) bind$ax25(r0, &(0x7f0000000280)={0x3, {"0729bd401df787"}, 0x80}, 0x10) recvfrom$inet(r0, &(0x7f00000001c0)=""/9, 0x9, 0x2023, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)='/dev/amidi#\x00', 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r3) 2018/04/13 09:12:25 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0x9, 0x80040) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000100)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@nat={'nat\x00', 0x19, 0x1, 0x2f8, [0x20000300, 0x0, 0x0, 0x20000330, 0x200005c8], 0x0, &(0x7f00000002c0), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x1d, 0x40, 0xedfe, 'ip6gretap0\x00', 'syz_tun\x00', 'ip6gre0\x00', 'ip_vti0\x00', @empty, [0xff, 0x0, 0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1e}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x1c8, 0x230, 0x268, [@comment={'comment\x00', 0x100}, @cpu={'cpu\x00', 0x8, {{0x7, 0x1}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}, @snat={'snat\x00', 0x10, {{@random="051ea6129519", 0x10}}}]}, @snat={'snat\x00', 0x10, {{@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x13}, 0x10}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x370) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) getpeername$netlink(r2, &(0x7f0000000140), &(0x7f0000000280)=0xc) getpeername$netlink(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) r3 = mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000003, 0x20010, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000680)={r3}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0xffffffffffffffbc, 0x4}, 'port1\x00', 0x59, 0x40000, 0x552, 0xdd0, 0x2, 0x2, 0x7, 0x0, 0x4, 0xa8}) 2018/04/13 09:12:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x0, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:25 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x0, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3a00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:25 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:25 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) fcntl$setlease(r0, 0x400, 0x2) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x415a) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) shmget(0x2, 0x2000, 0x22, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget(0x2, 0x4000, 0x200, &(0x7f0000ffc000/0x4000)=nil) r3 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80800) accept(r3, &(0x7f00000000c0)=@hci, &(0x7f0000000140)=0x80) shmctl$IPC_STAT(r2, 0x2, &(0x7f00000001c0)=""/254) 2018/04/13 09:12:25 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:25 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x29f0, @local={0xfe, 0x80, [], 0xaa}}, 0xfffffffffffffd62) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x4000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:25 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 2018/04/13 09:12:25 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r2, 0x7ff}, 0x8) r3 = msgget(0x1, 0x8e) msgctl$IPC_RMID(r3, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000100)={0x0, 0x8, 0x2, 0x6, 0x1, 0x3}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:25 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) 2018/04/13 09:12:25 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:25 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x0, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:25 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x600], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 282.208999] nla_parse: 4 callbacks suppressed [ 282.213747] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:26 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000003c0)={'bond_slave_0\x00', {0x2, 0x4e22, @rand_addr=0xfff}}) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:26 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) getsockopt(r0, 0xf0, 0x0, &(0x7f0000000000)=""/192, &(0x7f00000000c0)=0xc0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:26 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3a00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = getegid() fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f00000004c0)={0x1, 0x8000}, 0x8) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) r9 = getgid() setgroups(0x8, &(0x7f0000000480)=[r1, r2, r3, r4, r5, r6, r8, r9]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 2018/04/13 09:12:26 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) dup(r0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) 2018/04/13 09:12:26 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:26 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:26 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:26 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) dup(r0) 2018/04/13 09:12:26 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0xf0], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:26 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 283.089543] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 283.127935] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:26 executing program 3: getgid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20200, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000000c0)={0x2, 0x5e, &(0x7f0000000040)="da09175a50215879c8c2a2b35d57b32541640b74f7511f769086322c3cb204c6a375532f07553a7cd56acafe266b0aad33c2013ee816d328e11e0067edb4e3ab6cb90286765a0ac2a615aebc346521583ff240ac2fe0b9ec86bc977efbbc"}) 2018/04/13 09:12:26 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x0, 0x7}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000001c0)={0x4, {{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x0, 0x1, [{{0x2, 0x4e24}}]}, 0x110) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x0, {{0x2, 0x4e22, @loopback=0x7f000001}}, 0x1, 0x2, [{{0x2, 0x4e23, @rand_addr=0x2}}, {{0x2, 0x4e21}}]}, 0x190) 2018/04/13 09:12:26 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x28], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:26 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:26 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 283.352494] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:27 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) fanotify_init(0x8, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="591bef3d4d0160694ed7bbdaa5c94ac3cd099d78d8f9e60c2f9fe4f29f60c5c019be4d847f6e088ff367"], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000400)='./file0\x00', r0, r4) 2018/04/13 09:12:27 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000480)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x80, 0x800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000500)={@local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x100, 0x6, 0x10000000, 0x500, 0x9, 0x0, r1}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000580)=0x40, 0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c81) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000000)="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", 0xfe}, {&(0x7f00000001c0)="de17b236e89aae2499af142f7a17fffed444f7988e1863d5c22475841c9a29c8752270d68f2417afc16713d104f61e559626204741f9eb23414636bd5825ee755d38e1e3de4167cbbe0162322284150973fab3eec42ca0735c14bf00f4bce8026ee35a498dba8603f9b93b99fe58f210064de5b87c4bb69ff0b93bbf1de682192741c3bdab1ee10a14c44a0ddf4dfc9f27ef7ef43d4d653f00d694d03831e07e131322b7a018e34b493282328107f082865be5ae2a46f61474672c243dbcabb64bf1dce167988837104758805a1e66fb44b6fa56b2300334c329ef97", 0xdc}, {&(0x7f00000002c0)="82fad28004f54c0083ee7cf6e5146e1e3008bc88f1b09f5bc366a9e89bd1c04ec666298cbbd78ee60a064796678afb10027531189488a0b298d590a45c48f17b56e815a86cd8b68e7f5089a5d0e13d1f209f237fe516eb3ee04b15e3c053c344a34e364f12a703d978e7dfc0e97df637224afc5029a7d2cc9d4638077036ca8b821caa4aa20720dbe4f9b9829654655a690170376e2f16", 0x97}, {&(0x7f0000000100)}, {&(0x7f0000000380)="05a89f95f46250de9de08e3adde23fc2489222e3a8cc08c079825dba40189f18b65c54dd0176470ac2b96ed760e04930dde9639d06148dabc989e954e61c4418044d2cf7358c2c3e5d7625a810d6c26d0ce8de5697b0bddc57242ba7ca32fe2f", 0x60}], 0x5) 2018/04/13 09:12:27 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:27 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:27 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @rand_addr=0x7}}, [0x0, 0xfffffffffffffffe, 0x400, 0x2, 0x1, 0x0, 0xffff, 0x9, 0x100000000, 0x100000000, 0x1, 0x100, 0xffffffffffffffc0, 0x7ff, 0xfffffffffffffff8]}, &(0x7f00000002c0)=0x100) r2 = msgget$private(0x0, 0x4) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000080)=""/14) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = semget(0x0, 0x0, 0x100) semctl$GETVAL(r4, 0x3, 0xc, &(0x7f0000000000)=""/69) 2018/04/13 09:12:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x2100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 283.543766] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 283.561753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:27 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x7fffffff}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={r2, 0x9}, &(0x7f0000000240)=0x8) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1000, 0x328}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r3, 0x4, 0x9, 0x88, 0x6, 0x8}, 0x14) 2018/04/13 09:12:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = geteuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r2, 0x1400) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:27 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3200], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:27 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x3300], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 283.767147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:27 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:27 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:27 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:27 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200, 0x0) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x1100000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:27 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) [ 283.977823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:27 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff80000001, 0x14000) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000040)={@empty, @multicast2}, &(0x7f0000000080)=0x8) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x400000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:27 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x202, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x3}, 0x4) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x45) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x10) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x824b60fdd6082c41, 0x8}) [ 284.022812] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:27 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:27 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 2018/04/13 09:12:27 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x6000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:27 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$llc(r1, &(0x7f0000000000)="be8b7fb6ad52c65494c4b94fdc4627c871714dce5bf912544b8037da4ed7fadcbb2ac19753b11c7c54ca475372b4e3715c2de955059cf9d3de31c1a24b4274c1bbe117ae0a8b35dc5c57e2ebd5565fda34257583b6e3779a30dc057ddc93189bb5bf3dc144afddd67b9f82b9666c4e802b3f3913ad490171e1906584614e39a53ba36557b9541b9ac043e6e793ca13", 0x8f, 0x0, 0x0, 0x0) [ 284.170336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:28 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:28 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 2018/04/13 09:12:28 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:28 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3a00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:28 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:28 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) close(r0) pwrite64(r0, &(0x7f0000000000)="9b2baebcc912f32be564a9fb865fd10ec4beca15715478e0c7b48bdb4fea309eac38b88b6bb5e0633bdcaa91aa08f4459641f082366ff301f6346983717980daaa7a439f9a31", 0x46, 0x0) 2018/04/13 09:12:28 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x400, 0x2, 0x6, 0x3ea, 0x2, 0x3f, 0x3ff, 0xea, 0x40, 0x10d, 0xb026, 0x2, 0x38, 0x2, 0x7fff, 0x10001, 0x1}, [{0x5, 0xfff, 0x10001, 0x0, 0x101, 0x40, 0x1, 0x3f}, {0x6, 0x7, 0x9, 0x0, 0x80000001, 0x6, 0x1ff, 0x7f}], "341fba6b9fa59c7d527d4dd0906cc9e5556747231b6261b3b66c77c86d1a90420ebc4e4172a38182b93bd8589cbfe58ae687b7083b3fa250714785d0c86aa1016dc2de7dc718ced19b410d4a85f616aad87d3d0064c8aaf9dc1ed82438494aa8c1b3feb8", [[], [], [], [], [], [], [], [], [], []]}, 0xb14) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:28 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2f000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 284.375059] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. [ 284.408474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/13 09:12:28 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) prctl$intptr(0x1f, 0x6) [ 284.590847] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:28 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:28 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x600], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:28 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:28 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr\x00') setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000040)=0x3, 0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000001c0)={0x5, 0x9, 0x4, 0x8000, 0x8, [{0x497, 0xff, 0x105, 0x0, 0x0, 0x400}, {0x8, 0x7ff, 0x4, 0x0, 0x0, 0x1}, {0x6, 0x5, 0xffff, 0x0, 0x0, 0x3}, {0x7, 0x4be798f2, 0x3, 0x0, 0x0, 0x288}, {0x80000001, 0xfffffffffffffff7, 0x10000}, {0x0, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x1}, {0x324, 0x1, 0x3, 0x0, 0x0, 0x204}, {0x100000000, 0x0, 0x4010000000, 0x0, 0x0, 0x104}]}) 2018/04/13 09:12:28 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:28 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:28 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x7f, 0x400000) execveat(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000440)='/selinux/mls\x00', &(0x7f0000000480)='/selinux/mls\x00', &(0x7f00000004c0)='dns_resolver\x00', &(0x7f0000000500)='/selinux/mls\x00', &(0x7f0000000540)='*]{\x00', &(0x7f0000000580)='dns_resolver\x00', &(0x7f00000005c0)="2565746831a92d2e00", &(0x7f0000000600)='/selinux/mls\x00', &(0x7f0000000640)='[vmnet0mime_typeeth1ppp1\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='/selinux/mls\x00', &(0x7f0000000740)='/selinux/mls\x00'], 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) syz_open_dev$tun(&(0x7f0000000840)='/dev/net/tun\x00', 0x0, 0x8a400) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000880)={@remote}, &(0x7f00000008c0)=0x14) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="c9af639867e74573853bc22b5d4230d6687a05000000000000005cc1076efd94552d314f929700abe95efe00020000000000006b48a711c05c92b2009001214bd2f0000000000000010400"], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x2001) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f00000000c0)) sync_file_range(r0, 0x1, 0x6, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1f, 0x900000000000, 0x9, 0x8, 0x1, r2, 0x100}, 0x2c) 2018/04/13 09:12:28 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)="e4c6d0597f718dbff543433889877ab9df35298e47c34a1ba5f33240e73a252f5ab24fd0539e710f0ecbaeae91e1715181fccf10", 0x34, 0x0) keyctl$setperm(0x5, r1, 0x0) [ 284.726786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:28 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3a00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:28 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = open(&(0x7f0000000000)='./file0\x00', 0x480040, 0x134) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7ff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000100)={r1, r1}) 2018/04/13 09:12:29 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:29 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:29 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:29 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:29 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x11], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:29 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:29 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0xfffffffffffeffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x9, 0x82100) ioctl$TTUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/114) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, &(0x7f0000000100)=0x4) 2018/04/13 09:12:29 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2b00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:29 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:29 executing program 7: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x20000) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f0000000040)="0ea9e847790d7d17f42f90e97dea10d1870ca32b1ce9231e17cdbb42f46e6285adbf508a57b365b67429ace5cc2c66c68ca19ae41c7f866908f7cfe7c1d06dfa5bcffe7d04ff25a7bc79559e0be8656cf17803a61ac361246b9791a50edc247537b9e4c54588ed6ea14786aba0dc530d56c2d77b2345a4be1a5f37ebf35a32a3c001a7", 0x83) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000280)={r1, &(0x7f0000000240)=""/19}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r3) 2018/04/13 09:12:29 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:29 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="1eda69d4a1e39eda7f002bdf57c4df6e", 0x10) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100000000, 0x80000) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=""/156, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x5, 0x0, 0x8, 0x1, 0x9, 0x2]}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f00000000c0)={@empty, @local={0xac, 0x14, 0x14, 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000280)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, r3, 0x503, 0x70bd27, 0x25dfdbff, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xb}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) 2018/04/13 09:12:29 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:29 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:29 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:29 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:29 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:30 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000280)=0x7) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x280, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f0000000200)={r3, 0x3}) ioctl$KDDISABIO(r2, 0x4b37) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000002c0)=""/229) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x100) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)='ppp0nodev\x00', 0xa, 0x1) openat(r4, &(0x7f0000000040)='./file0\x00', 0x82002, 0xac) timerfd_create(0x1, 0x800) 2018/04/13 09:12:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:30 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xf0ffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:30 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:30 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:30 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:30 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:30 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 2018/04/13 09:12:30 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:30 executing program 7: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/04/13 09:12:30 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x33000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:30 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:30 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:30 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:31 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 7: r0 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0x6, 0x410000) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000680)={[], 0xfff, 0x8, 0x7, 0x0, 0x100000000, 0x100000, 0x6000, [], 0x7ff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, 0x8, 0x7f, 0x9, 0x3}, &(0x7f0000000200)=0x98) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000240)=""/103, &(0x7f0000000140)=0x67) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getgid() sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)="ca20e298e8bc38d6153ed8b07f4e43f6df60b361000acd439f92e3dada5a567526d844ff33ca7c655b35bdff825f41fc021472a216bdac0f1534053379af3e30eeeafbd43fa5dcc801dd186a6c0f8ef503b031a151f5434fba301cea9badfd15b095af4cbe1a04cfe761d036c7cc3d0c569fc4f6c6fbfe5013a89447097ac032239f9c3e414f2194e0027f078dba12c61780d761ff6372", 0x97}, {&(0x7f0000000400)="7a29198e78dd3f002549df65367aec00af7b582452eaea7a85ed3c579584032200b7633fd4bbb5578714139771d2d903a395979459417f1d7eb0d10ec04171cdac272fd28b35b1debf13b7e0c57f68a931f671d0f31dc29c7b8fdacede94ab62382af741856e97b712ee2414a81de155099c", 0x72}], 0x1000000000000181, &(0x7f00000005c0), 0x20, 0x4000}, 0x4000) 2018/04/13 09:12:31 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2b000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:31 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) 2018/04/13 09:12:31 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000540)=@hopopts={0x2c, 0x20, [], [@pad1={0x0, 0x1}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x100000000}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x6, 0x2, 0x0, 0x5, [0x1a]}}, @ra={0x5, 0x2, 0x496}, @generic={0x8, 0xd2, "a7fd20dacb330e3b18826d054c7279ceb527de1be731e56104ff2c5b4bf76e2eb3cd7f9aaf93a4ef10a43aa435494d5d4ce2246dab627bfc31e5b81e722d028f4489cd40ed0764445bb8a94377ff4639e574c2ab8a5bebc3b437bc4b4ca2efca61c5d1394193ad882a536281e7722d8dcd8b0a07a6b5d323acb990277c5a821d9279073fbc1c8ad432bd9fad63926be1747f7859a08cf37afc42b9519745b31d1208b1c9467db7785511f1ab3ec68519ed54c76d24e42bdddf3603e07efe3b34079e4e6b9199c3433fa77861311d7caacd6e"}]}, 0x110) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) bind$inet6(r2, &(0x7f00000004c0)={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0xc}, 0x8}, 0x1c) recvfrom(r1, &(0x7f0000000400)=""/154, 0x2, 0x40000140, 0x0, 0xfffffffffffffc58) 2018/04/13 09:12:31 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2900], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 287.893334] nla_parse: 5 callbacks suppressed [ 287.893342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:31 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:31 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) msgget(0x2, 0x10) r1 = msgget(0x0, 0x9) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000200)=""/114) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:31 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) 2018/04/13 09:12:31 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xf0], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:31 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 288.067874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:31 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:31 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 288.273168] netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. 2018/04/13 09:12:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x4003e, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x20c81, 0x171) 2018/04/13 09:12:32 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3200], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:32 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:32 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="5e0000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:32 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x100) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) 2018/04/13 09:12:32 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:32 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0xfffffffffffffbff, 0x80000) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:32 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:32 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x33], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:32 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="0f0000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:32 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:32 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0x6, 0x410000) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000680)={[], 0xfff, 0x8, 0x7, 0x0, 0x100000000, 0x100000, 0x6000, [], 0x7ff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r1, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000080)={r3, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, 0x8, 0x7f, 0x9, 0x3}, &(0x7f0000000200)=0x98) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000240)=""/103, &(0x7f0000000140)=0x67) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) getgid() sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000340)="ca20e298e8bc38d6153ed8b07f4e43f6df60b361000acd439f92e3dada5a567526d844ff33ca7c655b35bdff825f41fc021472a216bdac0f1534053379af3e30eeeafbd43fa5dcc801dd186a6c0f8ef503b031a151f5434fba301cea9badfd15b095af4cbe1a04cfe761d036c7cc3d0c569fc4f6c6fbfe5013a89447097ac032239f9c3e414f2194e0027f078dba12c61780d761ff6372", 0x97}, {&(0x7f0000000400)="7a29198e78dd3f002549df65367aec00af7b582452eaea7a85ed3c579584032200b7633fd4bbb5578714139771d2d903a395979459417f1d7eb0d10ec04171cdac272fd28b35b1debf13b7e0c57f68a931f671d0f31dc29c7b8fdacede94ab62382af741856e97b712ee2414a81de155099c", 0x72}], 0x1000000000000181, &(0x7f00000005c0), 0x20, 0x4000}, 0x4000) 2018/04/13 09:12:32 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x3, 0x2) modify_ldt$read_default(0x2, &(0x7f0000000040)=""/6, 0x6) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:32 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59", [[]]}, 0x1a6) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:32 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:32 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2f], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:32 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:32 executing program 7: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xf9, 0x408000) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000040)="120000003200f1bcc1acb3f2d5d51a13a4e7", 0x12, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x12) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000001c0)={r2}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/115) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x100000000000, 0x0) fchdir(r4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0xff, @local={0xfe, 0x80, [], 0xaa}, 0x4}, {0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x10001}, 0x3ff, [0x4, 0x2, 0x79, 0x6, 0x401, 0x8, 0x1, 0x591c]}, 0x5c) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 2018/04/13 09:12:33 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="c00e00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:33 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) mlockall(0x3) 2018/04/13 09:12:33 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3a], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:33 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000080)='/dev/loop-control\x00', 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000002c0)='/dev/loop-control\x00', 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, r1, &(0x7f00000000c0)=[{&(0x7f00000001c0)="01a13b0d57f6d0b5ea86cce63cf594a3b6dfadee897b8a9a73fd3f65fd6dcb560f9f1178c8c7259490e6dd3acb93f0c4db7c41be8db821649c706627d8aa083fcbd187c670ce8e2b5ad806f7da9ddca16927a097d6ff1dfcbafacda30f43f9d087c467df5849658ebfa47e0ae6d46d7cc14b848a5892da1dcad981c88243753ac8446cb854655df5abfca58c86adeb68981b8f044c230740ddf26fd747954ecf883ddb22e7cac6e3556719ae14e864849c932d0c8c018b7b411c18f380c9da53b160b32a204bc2", 0xc7}], 0x1, r2) 2018/04/13 09:12:33 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:33 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59", [[]]}, 0x1a6) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:33 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) r0 = request_key(&(0x7f00000003c0)='pkcs7_test\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000440)='proc-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', r0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:33 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:33 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="effdffff0104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:33 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xffffff88], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:33 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x40) accept4$llc(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x40000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) 2018/04/13 09:12:33 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x7, r0, 0x1}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$sock_ipx_SIOCIPXNCPCONN(r1, 0x89e3, &(0x7f0000000040)=0x1000) 2018/04/13 09:12:33 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:33 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59", [[]]}, 0x1a6) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:34 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:34 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x89ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2040) getsockopt$inet_tcp_buf(r1, 0x6, 0x3d, &(0x7f0000000100)=""/67, &(0x7f00000001c0)=0x43) 2018/04/13 09:12:34 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="8b1fc2200104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:34 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x141100) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000080)={0x6, 0x72, 0xfffffffffffffffc, 0x4, 0x80000001}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000ee0000)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000002c0)={0x1d}, 0x10) sendmsg$can_raw(r2, &(0x7f0000001fc8)={&(0x7f000000a000)={0x1d, r3}, 0x336, &(0x7f0000000000)={&(0x7f0000004fb8)=@canfd={{0x4}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fce00029c699f5ff986ca08990039966a7d5cb2bdac3fa820845860cb5fee496e6866856b76b50100000000000000004e2f5763a918fa1efd9b0b"}, 0x2b8}, 0x1}, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:34 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000003c0)={'team0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x10000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty, 0x4}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:34 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:34 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa", [[]]}, 0x1cd) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:34 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="e03f03000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:34 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x1100], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:34 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_names\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000040)={0x2, 0x8001, 0x3, 0xf439, 0xb, 0x6f}) 2018/04/13 09:12:34 executing program 7: r0 = semget$private(0x0, 0x4, 0x204) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000000)=""/35) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x100ffc, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:34 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000440)={r2, r3/1000+30000}, 0x10) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r5 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6dc65bdec26a0e46f5b61773bfec6bd6a5848a7d6dd82fe350f84c0c8345b142b1e1ca"], 0x1}, 0x1}, 0x0) connect$unix(r5, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r4, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:34 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa", [[]]}, 0x1cd) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:34 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="00f0ff7f0104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:36 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xffffffffffffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:36 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) recvmmsg(0xffffffffffffffff, &(0x7f00000059c0)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/11, 0xb}, {&(0x7f0000000040)=""/164, 0xa4}, {&(0x7f00000011c0)=""/205, 0xcd}, {&(0x7f0000000100)=""/20, 0x14}], 0x5, &(0x7f0000001340)=""/108, 0x6c, 0x6}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000140)=""/2, 0x2}, {&(0x7f00000013c0)=""/79, 0x4f}, {&(0x7f0000001440)=""/220, 0xdc}, {&(0x7f0000001540)=""/66, 0x42}, {&(0x7f00000015c0)=""/6, 0x6}], 0x5, 0x0, 0x0, 0xcd}, 0x8}, {{0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001680)=""/237, 0xed}, {&(0x7f0000001780)=""/248, 0xf8}, {&(0x7f0000001880)=""/151, 0x97}, {&(0x7f0000001940)=""/227, 0xe3}], 0x4, 0x0, 0x0, 0x7}, 0x79da}, {{&(0x7f0000001a80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001b00)=""/91, 0x5b}, {&(0x7f0000001b80)=""/240, 0xf0}, {&(0x7f0000001c80)=""/226, 0xe2}, {&(0x7f0000001d80)=""/42, 0x2a}, {&(0x7f0000001dc0)=""/18, 0x12}, {&(0x7f0000001e00)=""/20, 0x14}, {&(0x7f0000001e40)=""/73, 0x49}, {&(0x7f0000001ec0)=""/60, 0x3c}, {&(0x7f0000001f00)=""/151, 0x97}, {&(0x7f0000001fc0)=""/18, 0x12}], 0xa, &(0x7f00000020c0)=""/116, 0x74, 0x6}, 0x4}, {{&(0x7f0000002140)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000031c0)=[{&(0x7f00000021c0)=""/4096, 0x1000}], 0x1, &(0x7f0000003200)=""/164, 0xa4, 0x9}, 0x3}, {{&(0x7f00000032c0)=@in={0x0, 0x0, @local}, 0x80, &(0x7f0000004740)=[{&(0x7f0000003340)=""/204, 0xcc}, {&(0x7f0000003440)=""/186, 0xba}, {&(0x7f0000003500)=""/42, 0x2a}, {&(0x7f0000003540)=""/57, 0x39}, {&(0x7f0000003580)=""/168, 0xa8}, {&(0x7f0000003640)=""/40, 0x28}, {&(0x7f0000003680)}, {&(0x7f00000036c0)=""/20, 0x14}, {&(0x7f0000003700)=""/4096, 0x1000}, {&(0x7f0000004700)=""/11, 0xb}], 0xa, &(0x7f0000004800)=""/32, 0x20, 0x7}, 0x20}, {{&(0x7f0000004840), 0x80, &(0x7f0000005980)=[{&(0x7f00000048c0)=""/4096, 0x1000}, {&(0x7f00000058c0)=""/3, 0x3}, {&(0x7f0000005900)=""/104, 0x68}], 0x3, 0x0, 0x0, 0x3bd}, 0x1}], 0x7, 0x40000000, &(0x7f0000005b80)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000003680)=0xc72b, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000005c00)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x40) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000005c80)={&(0x7f0000005c40)=[0xff, 0xd392, 0x1, 0x9, 0x9, 0x4, 0x5, 0x3f, 0x80], 0x9, 0x1f, 0x1, 0x101, 0x5, 0x3bf5, {0xe5, 0x2f, 0x6, 0x81, 0xffffffffffffffff, 0x4, 0xef, 0x400, 0x8, 0x4, 0x1000100000, 0x6, 0x0, 0x61af, "ccbb039fc3941664f08fc1063c50f2fc853cbdd7af57cf973130ba1d46409787"}}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000005bc0)={'erspan0\x00', {0x2, 0x4e23, @multicast2=0xe0000002}}) 2018/04/13 09:12:36 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0xffff, 0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) 2018/04/13 09:12:36 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() syz_open_dev$midi(&(0x7f0000000600)='/dev/midi#\x00', 0x9, 0x10000) syz_open_dev$dspn(&(0x7f0000000680)='/dev/dsp#\x00', 0x7, 0x10000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vga_arbiter\x00', 0x2e2d5d5420bd5e64, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000700)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xffffffef) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) r3 = getpgrp(0xffffffffffffffff) ptrace$cont(0x9, r3, 0x5, 0x8000) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r4 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r4, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:36 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="c00000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:36 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa", [[]]}, 0x1cd) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xfffff000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:36 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240200000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:36 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x4, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x935, 0x513000) bind$bt_rfcomm(r2, &(0x7f0000000200)={0x1f, {0x6, 0xe42, 0x5, 0xffffffffffffffff, 0xfcf, 0x8}, 0x7ff}, 0xa) sendto(r1, &(0x7f0000000080)="a818c130290b08f3847b9d18908411ada5470868e0fb2a3f573af56782dd15a8a868bef8f71be86adf3619cf8656df7643b60f072d57a27d29f6edfced371799ff417b08db93fe3a027bf9ed53a62b0b9ec9c1a3f5615b4e86b23dfff0a14ff277c1adce6e92b25e435098cb96651a6c38bf46706b8f0b6e6eace9aaec45d9ffa3517c2aec6e58b1560259f33d4a34dc2da8a2f5c3", 0x95, 0x0, &(0x7f0000000140)=@generic={0x19, "70d11d0875574c8c2f87ddab0b9e98d4939c842fbaa5c962b11ede778a35b61eaeeed685e2d1add532c2b75da89ce4e39fc06d255fa5f62136f4b73bc6f47bb123d45b154a50b7b9030f389f72a9bff6960599a99552b251a3350f626960582237332d1e69a937783f7b2178909720c29efa928debee0fcfe608137c705e"}, 0x80) sendmmsg$nfc_llcp(r2, &(0x7f0000004400)=[{&(0x7f0000000240)={0x27, 0x1, 0x0, 0x7, 0x3ff, 0x7, "6fcdca623d0c65c5be8226387eb620fe8c2c930551265f8b23d998d958108c82540e5ee878d5e67a0c8125b4d58ce4d53fc8e26730dc782cd3a09ab13f4366", 0x5}, 0x60, &(0x7f0000000680)=[{&(0x7f00000002c0)="06488d56ce7d0792c31f05657863d1040b236dc96698a1edd352ff27de7ed400408f425c7bd7427ed014a4cc7eff99e19be9cc039cd05d5ccd7ea4c909d403c8eafeb98133ee47eceed243ad5e48323ab4d9f625b853e14729402e3fb35ea130ef6ef87779fb0f6fd132341f46156369", 0x70}, {&(0x7f0000000340)="c7666ccabbd559cf22a1ddf586536eceed6977e11bb7ae2bb8ec291118", 0x1d}, {&(0x7f0000000380)="5674b48c1a0293344cff2328974a3fec0522cd4f1ca699fa76f70eea82d832ac6f73d9b90b206b4e703588066379f3034f89aebeb2ce561aaacf465b2a5f0bf0c921f0f921ac8159dbb24543501701da15505a86267e1e35b351ae80436b4b9578bae5fa46", 0x65}, {&(0x7f0000000400)="e0ae378e51dac8be06d344ec2d6a2fd44b781828b4a45aa2a5e27636f9c341a92f1690e6aaab0001f57129933938b6a9622b9e8b56655c800bde2817f0185b713876dd067d9dde116cd09febb18ba6e23f9f2c7afccc8b617087e29d21f45b6c4b94c965e353ff6d00a954a7488caef6917af7", 0x73}, {&(0x7f0000000480)="c29740a3982eef0e7f94b90424e486c37b25c5d39275ea9da0f8da3e03069be05816ffe305efaf077274a9a39c3b87d33125955ac33f35dba5d89594797846780ec0", 0x42}, {&(0x7f0000000500)="da761d99644e2fbbe09a239f1c73b217834ea8170e8ce53082b532fd22a9b33854053ba06b58068a8b36c8cec07e08da5d4dd212912bb829430ee30da527747a3fa6740903388b370c8504015c10657bb823bdd80df3eb7f72c79e1a0cc67e497216eddff0869fa115da55341a691825cb1bf4ec19c1ced5c21ce10d093623da8e4a81a3c6bb0ab7c11316603ce068013193fda3d5ed9b3a1bdd0ee2f6cab1b20681df2f187e6ca465fadc96543c92a9fedeb01b", 0xb4}, {&(0x7f00000005c0)="1f8c51fa41c8b5570a916e72bb40ea79814891a1d66517c2d7d0e6f4aac651fd65cea8f063855c5dc0afa09612bafbfdc558e3cd1070e42101fd9d87229d4e5e637ce74999cf066cda6e51e9f788bded02d5c2b92ca51a3faff9ad52f019a9d42062f0ffe1380285a5d0dfe9ba73d3e3e6b4532492278376178225bd7d1dbc230632437860d9e6", 0x87}], 0x7, 0x0, 0x0, 0x400c011}, {&(0x7f0000000700)={0x27, 0x0, 0x1, 0x3, 0x3cc, 0x2, "00c9cdd320d4a0ae47a149705b357f932659e246bc1416989b1ba988085f32240a11392ae8d1a822e4f0be0970945acc8875e0bc168d449b48cd4a71a92fe9", 0x6}, 0x60, &(0x7f0000000c40)=[{&(0x7f0000000780)="e4bd8dae80f0f6e1741f34d7735cd2b6351c38a4edc9b64d7cbb01acf3f693dcace71df83cc297ceb6f8fde5c222c336dbacaf6e01636dc9914f8c479d61de3c65845dc9dcfc459288e03aa817f9bbaaf8454c2dedcf746c84c3f8328436b37f7dcda9fcee3c5ae347279c6170ad62d9454676c25c5ec8593846c9875b6cad22e9bbee05eb3d835a1c71d5c4ef9166c6a26dca4b91ff7b05a89e84ed7ec5aab9d87e6fe0453ae199eff0bba65adfdf59139c52ba8cfa8ba6402397aaeb55dea8c511e6f8f0ab46381d", 0xc9}, {&(0x7f0000000880)="c13ff8b5d22d7f382af6fe9c00b6", 0xe}, {&(0x7f00000008c0)="cfa64151c45fb76b15045a988550e09ff2d5e1ae1cfc430e", 0x18}, {&(0x7f0000000900)="6a32032e0379ee9b3886c8401110c33baf2afe429be3d2a0d0fd8edfbe12c1c8ea091bad8f1321f1352ba77952fd45ad24ed91dbc63da572ae014b9dc0fe7e351c2a990049f6a0baafbefe51b9ba9264cb1520d0122ebb5f1ccd82a15f61f41d198eee90679056d19e1947fcf28714e345da06dbf67e381cfdb8fc101ea30f13b1132ac93bd163b36d13318235aafc1fba1e77f9ce58838258310605b6cb5fe90c3f81f7a39473134ef4e3aeec079a51fed9ea5691960dab6bc8807c92aa14fa84e9da4642e1d44f2f004149137d8bbc12a05c852ade0b7dcf3c93fce9a30d7b66c2c85edb502b7e62fee715a5df1211", 0xf0}, {&(0x7f0000000a00)="fb50c80905e4cca156edc6eee66cea6e12225dd630a27214af4c16b4954a7f2807f1c1e041e7147be17c3bde12573c79f8d1636f8481e77147fe3bf49255ee43ec626aa42ab98c50d43081b12f6ab83526bcc397e5c8579ebf550d54584bbd920b5517d63a3b037d086ffbe8a33d1a9b9a16c2c2781a4ce5b23f2f0ee2e514fb030ec53e04b2a3554f63359774de9a9256c1dca3722fb0da65e32e17e0d2ab80c922c721938676a3eedd31a4ab608d84afc68516f6e56094978b6380a85b2f9fc861324cab6dcef9ec29fa1af46ac66b5dad4fc41a445eea454d268e995054673002e3", 0xe3}, {&(0x7f0000000b00)="82b1084588c0d6daea856bd8a24eb139772bf1254eeaee8f4bffc0df3934a040bde429a155e0f171118ca68b9ad5b688ca8f867ad55ca634204e845d03dd03310f82cb284c9ed04090d625692a896bcc97", 0x51}, {&(0x7f0000000b80)="40f26333cebd9d7497cbe025af7c36b99fc73765eb91f1effa1c7a3a4b6b0b51af8c9c96b689033d86065bb66cc676749b03647f45c37dc1c10fcf067273c2cbbd1980bf24536818de35fa95624818dac47152f0d6ccee30a99221e62f39dd4bcfa1617a4598cb2b6e1cfe82152030fc7725e1ac4cfcfc4480121967db434474f5a798c3097776ad54c2f5407612b2e336f6ed589dc1e91e2f2ff2881d4a8616f6dfb00ffe3944cc46542c88e018fc5afb64f135a14a637f316cd44757", 0xbd}], 0x7, &(0x7f0000000cc0)={0x48, 0x113, 0x4fc, "f7dc1a4ad89c8a80b883cda8b38fb2c8d78e5c7a4270eb77fc1d30e261f3930f020c7f71a0b80a29caa0e5b152600fc4143c"}, 0x48, 0x85230e52fa93f1a4}, {&(0x7f0000000d40)={0x27, 0x0, 0x1, 0x0, 0x2, 0x7f, "ed40c325801e170d623e767b8203a1f81560e3dd8b59dedb26c0b2b7f9c9c4eb84b382ef11ed86eea347f9f8931660cd60ea42a57e1649ba5fd90065e446c5", 0xf}, 0x60, &(0x7f0000000f40)=[{&(0x7f0000000dc0)="505391e5fdcef2e731b4e44a6dbfef51857a39f70a8f079a98e953a3dec04de4f0903c01231310c316846d5bc2f865236504cf3db2bdec2cf56df63bc09fd57a2b7625ed99cc9b8d22f79eb791f2623e297bd1074ccb2da2f88d67cdce6384c0bd1fdf1d8218b8c3eabdf2b794263fbd5b5cc3a5073b52e2eacf79", 0x7b}, {&(0x7f0000000e40)="889ef1d2a951e509db48254be14b26c0ded95d289a18c1f5203a2bae4437340469554dd512a31413be08d5fa45410b148df9a7a31825bcaef55f9f07135dc8883c1c74af35185c0332ff87157aae4bad9e87379b1dafa3522556193ee70e9bdbaa03725f83f889a0ea55ae3ceebca8b3432e96aa2dc750b3d4652cca6755fa4d0359", 0x82}, {&(0x7f0000000f00)="65517538b50bf70d4d83b8ac0d393e18e7", 0x11}], 0x3, 0x0, 0x0, 0x4080}, {&(0x7f0000000f80)={0x27, 0x1, 0x1, 0x5, 0x3, 0xa1, "6a3cf146beace6b6739dbdd67556db9c2ce2667f4edc9d30190c6f76dba6bbbeb8c43ab78ca50dbee78d6a881fd6c7ce04914b3fbb6069ab1243582c588128", 0x2b}, 0x60, &(0x7f0000001200)=[{&(0x7f0000001000)='jx\\6', 0x4}, {&(0x7f0000001040)="fa848e266a81d473ecc39c987e7ea2e2a78b29d5219d51d3c263231ada3d4e5e3c63257552a7fff59bf6c9e7f4d0809108381d1023b0d0cc79d3b34685d5c2edf1c1472fade36db0c6ec7a5014abd12a7888477a2f1db7f7dca1debda094b60cbe67ad7bf0f6fef03a6faba0bf403b89104abad395e9b6d0d7577b0cfc582c1bdcfcd119a8d748d60a68766cd39ecd5cdbddea25f5ce1d8d6c9bc50e4cb0b99bebaa13fd9b37d6cf410085e6a10daaafce84e8", 0xb3}, {&(0x7f0000001100)="d3067a8be1b509f1785ff8c5145dca2633ec3cc33070d277bd3c5a9da1ac07747ab79a7d59b9cb88bfc96c8bb98caaac6c6c70ef7a7ed7dff00259cdd15e0b2be4290f04486c5f2848bc94834c69a4f483002686f6fdcf9bc23b7af1ad427b5260efcbafad637113a9f5c8cf4057c4634494ef8b5456855803b92066882e52", 0x7f}, {&(0x7f0000001180)="3567c369594da8b1f05fae8a50d6d40e6dc2840efaf304e0328593f9fc9a1198b2e7c549741942e755220f8164909f7bff031e9c80b71ac92fcfcdb488e8a79e3a35243fd800ed9452df9e", 0x4b}], 0x4, 0x0, 0x0, 0x801}, {&(0x7f0000001240)={0x27, 0x0, 0x0, 0x3, 0x80, 0x3c27, "4d45e7cd683e3dcf6917da1fe46a1daa89580090a2396f6e3ea7bbc1c2223f25e4a09ca5264979e9c2f7f19a42371034caf889228dd0d557b7fe81c73a5229", 0x1c}, 0x60, &(0x7f0000001480)=[{&(0x7f00000012c0)="e0a3f0548d1baf5bd9ca95f5c256429daf22958285d66af2ebc68df77024ed895bebb22fe6ddfa94bba6101817161d8fa8fba03c8cfbc8bad2e8ee4fb0868805917cefe9a1ae72e2c10d78da80ef6a197a92d2ab9e13d6adb179003219b641bbbd528d3aa1c7ef86572aae942c0a221f671ce50b9fab61e2f398e5c9fdad3956852df04fc26642b75af569276b32f329db90a794d62bed26cdd16e265a18bc342d73795ca8cb8f336a4a768e62131fba9f142760b19119e3b93eb1ad4c6f00593f076503246db7d7d9e1fcf48cd0ecb9bf6015ca595316be69ca948aa1edf34304275d8c991a9e4b213cccb881231a93919a3fc7", 0xf4}, {&(0x7f00000013c0)="ad7d0769c6e5fe6bbafb4d861b0f34d51737b3a3c43b937e9b7190187abf968da096fde67545c4473f3b1c82290f0e668c74e4632585bd8482b8b08ed8eef3174ecc0c78e26bb5b8c3240422b23bb9e6b5944292b25bda6a1233b2fee960d81c2c49c1b110d1a7524e76455ebbe1b0e77f36d5fa3695b5651fe6af4152b4c198c5bf2119652885d94c9e71c70bb0ba4d0ed3f59d8dad993e05fdbac9c2e0da16bdc8105eae8a8df3604540", 0xab}], 0x2, &(0x7f00000014c0)={0xd8, 0x10c, 0x2, "cdd4e56893083be03ce1b6c583374a7cfc215b10b9cb37c60e25fa063325a093d4bcced391f9ba066821c1ed6ff2a311cbc14059d4605e9a4aee982c16abfd1c7429c5f7b6ec9356556885ff13ffc1ae1e900c154b4d4185e5663750405e893dac9edd7ba4a858cfe7e84f0f657d9a712d79d04e05886a375e29b4382aeffd76177e33b67de2d844ec324d8c701480094cce376d44afa1291a26034b18c5959b703b8b107b2386eaed8de34da89ee23a85e34e5ef3d7a253767b8877061457a7d3"}, 0xd8, 0x4000000}, {&(0x7f00000015c0)={0x27, 0x1, 0x2, 0x7, 0xa3e0, 0x7, "e1bbe3ec3e342143977aa9b3648e4cf87fd588382f7af70ddad712d264222eed37b5cfb2da8316a126e595758204d13d1caee5dfa906437b78d5b04366b987", 0x7}, 0x60, &(0x7f0000001640), 0x0, &(0x7f0000001680)={0x48, 0x1ff, 0xfffffffffffff000, "6407f37176dcbff9e71924778ce5f9242966effe21f8b8695d76501032b0c6b46074a137767f1b0a7f1037891b9f37baab0e5bf4"}, 0x48, 0x48800}, {&(0x7f0000001700)={0x27, 0x1, 0x2, 0x5, 0x6, 0x1, "e0398a6fe8cafedfee68cfc5d38152818c7a9adbf5875d013f951fc3a51b004c631ecd047fbfef0c5161e9041c1f74ec899d6b1b66250d7fc2eaefa7448fbd", 0x3d}, 0x60, &(0x7f0000001940)=[{&(0x7f0000001780)="50df8839f9489de73502c76d174c4dbe7e601749746d3fc7a84655f695630a8b80bb96ba31e65ae082c86e533993f4824ba165c231eb64683fa3fc5067374a371bca905f35140e648353e2ed40e161feb3c85ad29659b803ce87f4df2381cae3de8c2c88", 0x64}, {&(0x7f0000001800)="e657705efaa95a2a164bb1fc178e78a8e7f8", 0x12}, {&(0x7f0000001840)="7901600aa3d1b5e67cf0b4da72716c436a92ec2783c7327db340ab12e4f458ef303075b1767db5410e198c5845503d573be96c00e82329de571d9f11f8b1dcfc29634efb95ce6306e4996f5bffca978434184064d4ce071614dfdcbf38197756992fb5d1267d6ed20a989abe90979d5284475944b08b9d3c470e7263a11c9fd1e408e6c3af1c3d33b4a33ed76fb6e697800b4033c377689cf84dcf94b8d872457deaf30239dba1cb09b62caef32316073a2c99e8da8614f7c1ab11d8b982ca72c5072d1ad4ac9d250c612423911e0b2e1eceb2d970dbf2484af69267914d07ec477bff44790d82bbaa16b58397ec25121e6e89d6e5", 0xf5}], 0x3, &(0x7f0000001980)={0x60, 0x102, 0x3, "7e39d2bc2d8e387a9e33cc5d2b826b0ffe1b5e97d68da7a2f3032ad6938379b5e8bb4043308d3c4f0f777e4b15a366ea7d48ef1b7e7a45e12e8a727556d44305a68ba0f160715effe9d83e37c38984"}, 0x60, 0x10}, {&(0x7f0000001a00)={0x27, 0x0, 0x1, 0x3, 0x2, 0x3, "af10443e10c57a1c95bb521229bb8efe2760eae58ed562cc10de3b92fa7ba78e168c89484ba1b6eed7e161847862de9eb1965ff9a802894ae9ee7ad9492e94", 0x13}, 0x60, &(0x7f0000001dc0)=[{&(0x7f0000001a80)="bccb56194a7bf7a2d5f7477efad2dfa2346cae34af43d4e9f08044ca18097bf12de3da840cd2bb5a67cd2877033dc1bb7a82433e2f4fc750ce5a5fc74d03f86d99041e84f54b40337a09b4d293626515c7913de86bbfc428bed17265b0b0dadadf6065b7c293c20e0c4f8396e10da8723252393ee4f807cc97d5fc21a42e4105", 0x80}, {&(0x7f0000001b00)="0ed7041872eede5c6b71e66258d20eb731855bae45a10050e6ca08ac225b167751e71ebce67a10d7805d6c0faf9d430c231c8231d975e5f025bc0fa9cec80163cba6d407a043e8df86f6b48e7bbc2baf47aa577af9e53911cdeacdb1ff41232e7e4d8bab58a3b879da84de1a05bcd37150bd8442f963d3c9d6c4ce770aa05fc8cb391262a6ea672958514f068fcf8b556614a9e2194a271d508b2f86701be942de11d6cbe3a6cdf86608793547afa5d022b1f3c2b853da720d5b3b7aa55db4c851d8f708c20cceb94e610128a4c4775031cd771861476ea7a29cac19765dd672a3", 0xe1}, {&(0x7f0000001c00)="ed8a36edc5ff8d395d4effe641858849e09ef12dda015d07bdfff0bc29e5a1d032fff41413d5419bb1b0fcafc097916ff03d850c4de641573f932fde10c810c7bcfec3dbd20c13594127c18ee3d57c6a8acce5956f6f56ea14b1a3a06de2b7a0fce7c131253355494cf8de3f80afe14a3bf21e8cd8fb0470f970aa469e249d7f9b7fa071d9032d5c2cb0e81a626541d60f422ec40b42197e95e0222c15811029b6bd", 0xa2}, {&(0x7f0000001cc0)="6855b86118c62cc0f2b8de82661b55fbac676916ca23248add6790d037e041aa1102df61925280fa25d5d98d7d5af9325640b2aa30231e9007559a13d26169ea3a6cb65ec5c58f4c2fa29b078bd7bcb04ee3d782fea96190cd697b486fbb373eb5259d6f8cbcaaca85a7525977d67ab632901796b54e7be3c0c6915b053b05be5552059ac8797a73006814f09783ce4e73db2244941f4a01cd448cdd", 0x9c}, {&(0x7f0000001d80)="b88ec01f79a3bc545ac01bf934d08be5bc944d37bdc3331b0722f49a970f2d98d9341906", 0x24}], 0x5, 0x0, 0x0, 0x10}, {&(0x7f0000001e40)={0x27, 0x1, 0x2, 0x4, 0xcc5c, 0xfffffffffffffffd, "617723804cc43c7ff057a30bda7f87c6606b4984febd8953064568af282e32242e4f320441022ca248c22565622fe0c8908c988de623aa033581a21cf79286", 0x38}, 0x60, &(0x7f00000042c0)=[{&(0x7f0000001ec0)="9061d376ae78736084e52112720ddb1fccafecf68fe1c4d9dc0d353533c1ff3a2e686524571769b4feae763ee6089f32de12cd34b7f7e1135d62b9e2548f415524dfa7a6eda9977d1d3c1ea4721d3b0a4dde64f44c0572ba5314591577ccb18d7f40262e42c4d95f1db3a451889dd5dc4be959979a329bbca53ff7925f305dcc931a1a2bcc63319b215bc2d28294da711a11330148a77de378ad1ec6b336760d0e6383430edb7b7dfaaf9cdc926b6ee38a3588016357dfc7a43742361d6039a121faf8aa8e2988eb3d4a871852fc6bfc4c014016aa35e7b40ecba21fc3759c53c3dad1d3921107d30028c35ec87c186fb25b0d20483f6de2c8d84137dc31861215673dccecf870075a8a698ef255a558fc404aedd814ba4970c713e61db52659b4add1180c11f1ee909965d29d887a6053f495261710f5eb1b190371ea4e72b6fc013758121e87b24b3da464f4576ea2e77760a2ccc38224fb773551fab3cfe53a70fdf5fca19f868db57e4350e4820f5245cf725de45fe0ebf46f549f6b7458daf54be96404aee32c6076364785cdcc5850c5e5b173b58a13f8d5780512ac7126698d16c20f39d8e9b3b3dd1b053b11d688def64476f06b147d7eeb4f6d8eb378a9808acfa7e3bc76c8efd0f63cdadd5e7555b9c6875d587622061c6689b92f306708620a44ccf6e2a7a4d739c9c700e64abfc7ad3ed9b67bc8a75a8c10549cfa04fecd6da0f3679ff1a8bc2f2612eedbe1e69e441079bccb970a5ae696617fd78407aa592298b906fa1b1a2b85644f87e7d100683e1533f0bc3cae94c2eedc9034bc25b2b09ddc0fc61d39f38d6a6a4883500b2a99de917b6857f6dcf027ff03baed0e1a3f2307091d89a85ed5d29c9526678dd6c17a7b93c2eab1044f1eb178b7692789c7995d8f6133565c3e9e536aa82a02e046170b46e643cbc588daf1ac00f6b38e48f1d3c7319c4896401cf9508a5ed91b35c98ded42c92ba9cc93bb51fcb620bb1dd60d1fb8cf06882549da9cd1411abd6a6489fc6d5b4f0154096ef878a1211df7237fb338f588b141fbd4416369510a872844a4016d570db0d6d564698dcda228bbd46617a439c6fbf4ded2820561244c67979ee127c61d69c833e9d48b74c8ccfbb60653af5c565293ad80179ab1df40d6a684a91ade8fc8d9282a59ba63126f12155bb41b052aac31a1389d540564209365b451fdf96a799f80d2854f3c049aa0381be5f74a4c814924404ea8c522d58994cf1d03a65e852f8749663f739ec8af0b15f894883a7fb071a60ddd81377fb3b47692d31ea4cff49b54a1003c2067f86249ea4a3723342bc1680ca2c376106ded4afd8297fc662656694d805a7ababb56426b85190f2cdce500216e14051afec1028e0c6f72fd7d24cfe7baa51e6b4e90ea72a3a3d4ce2061bebe5e5295d382367889b1fa9a5db3213ece792c60436011f858de885d49c1ac5e4260d1449294d051e403f4a654ae6c88520cd5090809dd608eb21e03f84626a93e8d51fc262571d90d7016e61082c315897aa5f6ac37b94e288053a757c8bf72ea2067a2ec268dde020ea7157f492ca5366bc1a5578732575d0d2d207d687b61b824944d7d576cd0263fdee1ae0120a948f801e7bb8e908eea372e2cc2d5b66e1b67a8b2b4fb9fc752a6294a295c40a563329031d55bc27a93ccc7ab0e393d1ea4ac2bd5fff974cba1e126284a342f7c551abd039a18770ad3a5e16cce02bb7dd1db571bf5364e192c1c8a692ede549d6a48f7db9e788d2336e469ae1050e7ccf9e99bec367795762d3e692caec0cd62b571ec9b87a6496814d1473bb75703ac9ca895612ad04d54c1848855f10413a814631bef1aa0b38821eb8b19ef2f4a3ec96cca3f6d91054abbddb3720c663f9f4b60aa491fa5d8aace962157e1e5c3277fda842d1ff1dcbabb808e047e2c2d29ffb8c3905ec08ca5823cd4a20a5d1bafab988f0e0cef26147f242a96e8b1514fed2cec6048345ec080829630745b813844fad842be611239a8c9c7f605eb0010287e7a18c4ca5654e257d1d57cca94def96897b0c43b1013788d37414a8f0bc36ee1b0c67638155ac2eb2ea7716f747d241b3d928c2ee7940d7a03669c554c22bd447a1fcb004c47aeb45709199f84617beb80768e52ef20f7548938a2aba588cd350a03e499c17fc065619e577029d90578e8fd0874f046eaabcdae610dc0512cf7234f1d8113b8d9db93b531d6053516286936eedca34295905d899614fe32f86f8b358dfd7b78ee5eb281936e25fdfd9ef67dcc561e625bc8317f0a022392a0ab3bc88d31e9349844ded7c62a8a7089d1fc55242e1271a877e2295077e66ebc80a19818ea4fb5c69e2723dc0e5b8fdc3f291385ba0d6b309668a7b238710bb3e9f0857977b03abafc701ebfc55dea309021663e51a859628a6d501ea96fcb49bb0def38f7936e21a5adb4a9c5f0c3e8022e2e1de3083b9aa0ccdca89219bc762602f8211cbcd1cc3ca7c63c53c3688965f72e1a6bc89feed7ff80655945e7940b1c55d250cd82edbeff9871e0c94935f90b09fc58646261e68dacd287ec7ff4c27b82157f7fc4eccb189cb11c8b922d831318866c9b3fd56444c19385736f7e0e0307af7cffd927ff3e6eda7ee1f81c945bc1ac2273a9b6578a614260d0da6fe9397d2415be3233a304e8d60eaebf3a360d6699da85abb82199cfdcdad39fd3a5c116f6d7b7335d3490d2589bb5b0db86bf0e291e350b93791034891bada6f0878849b95e65dc0152ee4a8c765ff0e53716107656316bbb4801ee4bedee5da2f3207f27cbf62b95372c78ae3a581b63d9ca1ade5f0b12924b3b9566fa14def0d46277637ba389be30d141382aca5db64f68c05a3356659b9333acb13c63ece7047dbbf871bfabf7c0ad7c4bfa373e4f2cbce191e264461024ff4a277da4382be6bf824112b3274d908efe1b4605119a315508b0fc148d3ff032b4f2fd3f48d6a7a2de19d3b44af42d6e5d6117e7ef5bfe84915a9e9df72db038e1197f06af2e2697405a6da2340e17f5e2d16b39d55357e742f2155ca9de015165f69760dbb65d852be8ac935f864cd6caa6e10feac73ddcb0f299194cc3babd27e657cdae1f66bb4d0ba597236a45fba4a2ae19ab45e605549fd7c0c0a532d2f84daf09009c2100a441608acaaf9920c719d65d782f9f4944ad393d9ea278617cef94a8149b0471e2042e14d1b0ba6e18a4c18af11d19e8e73271e7d42027d88479aa357d46a7d4e2380a6e11610bb2f3720f27937c086bbb0da1cb22356510cc26bbc581fa5d1bf5d8245185ebbdd9a90f18408c3a5a14dd654a4d4dc81a6d379034037b389d2a76256dcee0c9e6b66f07b665c8adcdd5bd49e272a222f4add4b7a6ff7cfa785456e228218ab52d48a9c2e3c93ca83a309399bfd0041b9cc3c869beea2e98cfdafcc271da4975f79e038281298d5fca760c9783ec69c3ca0e6a4f19518df8cb448b2df273404b022898a5c750ea427a28686f7f4e4d7bf5a63d04738988957e63296a5e09f464a91ba907fc6f4336aa87997fc70c43eb4868fda1ec75311ef1b6401c656c9ad2334ab918a444839b5b129b01393aa84bc1eef83452687a78a662a146974de9270e7164fad99b1bb55db74b386976295a62fafde0606dc9879c87928703cc615a61ddbe067ed6295ac477fa54e336e4d0275340a424f630619cd1775909d30b7d995ca6625b92bacba15d84aa7cd26974fd9368ab6aa24dcd2a89ce2f098e6963cf70f8ceeee54fa8b759e539466e31afb5777027661bf52268bc71a54ce71d94aa9bdf0f6ecf8560edd88af9d7fe1939a8ac9000c1ca003401a890df4bcde09631286f823709ac8c7c5d9e2acae9a1f184e34218ac777e10d9bb83d612b45d6571d778a93e49dde07cc1563fc708e8f6b60e114167d726a1bcd56f4513269290c2130edeb1d63d6efba2a8da35b13054905b3111e65263ea56a81e40985da5ed466691a74dfdad617efb02780658f21cf907be1403da383db502f9acc33425c27a2a14d43ed99c69d1e135cbc4a26fd9bbdecc53af93712dcca77b2969b5e79e3f3ff7012e16144a498404e940ddf332561ed65198d9d8619f83968f188d347527f00577d2fe1f5538e6966ffa2bc4ce739b96b49470dfacc4ac31098acb5aef895e878867f3564f364522bcf399af3802e12b1412ea08228a64fdf8c8b7c800ef17b446668a78ce0abff27352eef0d44406df1681b30324e0d33fc74b559fce3a2ea526e2e81fb9406d5443a616cff929394136946de1adba7884c819107ddf94b991936bf536f017c96df3317cea5d9e2c6328303fce09b387cf9b4d76fd327d2900f961d095de13bf189e8fe6d89a94846b0531d6922cc4a8666181fabd9c37a20eba834711e2c44e81c0b807206e2b78cc004970f88e1f11fd9b385e75a32475f77197332ecd4067a8b5641100a98d38734a69a98fbaadeaca9c36290502a4bb19afecb48e3619ebbcff0541e7977024d166e59c85bcddca6e9a3c5b8626ac32a2158abdcba423bf0015406e9c8142c902ab7f9854f321ae9f2c90ff174994a84487a6ccb5a9800f0e79ca322cc59358c21fe9b357a358d8eefb01bc51bf453dd4cefbd05cba7dc50d86357d055545aa550c41d70a8875b213a02ac4ab79940848b00619cdcf8645725bc73349258b24ba525d6b293899a8a9b8c112121b850eae9a31dccb4b6652b19985ef688115c041ad70e0e06f9997952a52ec4b4a720d2ea94e0eb60eed1be72d6a6af074ab49e47691a9e9cdb8349494e74b97e2813a567dd787dff330c8eb334c68b306ff5586ddc4fb1e85755fa8411209ff470f1fdfc147160a0db5b062d1f42946fe0962cf1c8a24f14438139880342b0462c184f90f408105579d1396323dac354104798552a9fceb974b9fe96aca280ddcc13acb31c293e39e772598df0a84326d676af9dc607f2e552c169e2607ffa853b599d0951d09099089ee48e927c58bc55bdcf1683edb7c2166afcf98518f6c8eb4cc33bcff982641ce986e0639d9fcae5bc01d5b9a0e3c5733833d3a138f33393d3f6b21dcd53a34f78b1bfba7b1e757226424304d3501ab1fa619fdef24bda2afbbe62395909921dceeda3c4122e57483b344c21630bc718772e3003ee849852d3cdd4f6bc89a01962527c511d1a8360fe46287bca690927aff6339a94a9a312fff4fe8ad59da31448dfd3827eba394cb7a241097da43cfb51c11e4ccb2c67da1181c53649b07b593bad45087549930da8d85427f380f25689baece91b25059b6fbea1d86d7c92bfff4544d7ccbd19b14358434db514d908942c1cf090f86d628801ae690efb64841e916a468ee96187886ffb532a3c5e65bf8898545aeeb37f8fef17b26097fa0e167c40f07ee11ae58b678b255548b47f06dc4fe06502391579f47c32850b8bc6642fd086d3f55c692ff5e55d53478920de6871cb7f8712c94f6332000aaef7f712c2c4e7af47a034d04c728fba0180fd4f08e0400ed9c797ccc644adce4ff42b6f9cdaa33880ed5a9e88f3abb950033a940dee9d824ed2d44bd7f946387f1f6e42c99e82812ccb0f171adbfc98ec974c8dab85024723516a2f924731f4ee831ea9c497b4ebd2671c7858eaefd4d68bfea274fbb9c1f361b6a310b5cc95e2b40ed53cefb3645b94faf3dd9af19a45c3f8ba83667577c12e1baf4f6cb4be65e0340eb14b6f8500e9038f89da40b8134ee5cd9694acf6d51589c71963f3738fa63faf12bc6327aeff0b07d509a7811", 0x1000}, {&(0x7f0000002ec0)="3fcad18f3814cad2e923e83a4538f2036d894dcf8238be8bfc507ca84356a6e5d20568040815930b5f62957c5edec4028155cfafe243becc08865f72fb7dcb562e40c57edee6832ed080c1c6c022e2e7a843f7c8defd9bf7399a27ff59183b33c6f434e03966c14b15150a6c10f6c9f8bfc43b859abf7b0f9269eeccc96533119dfd29880de5b47c6bd795425062b0a562a216f9720ae7b9cae6bc3ba3dcbf70a3cd9d8864984254ada4d5fa77974effe512ed608c44554500ccb8c70259f1a53f518d7845d177e84ffe25", 0xcb}, {&(0x7f0000002fc0)="f4d5a1cc89e05d53", 0x8}, {&(0x7f0000003000)="dd5cde058ea58eb6131f52d0e068bfcd", 0x10}, {&(0x7f0000003040)="554b023f1237c7a9302af19e689d2ce622b41677475d62fea8c0bc7882d4a6ec9b9bd672413da0bf94184e5a09afdf076d58c38b93c87c462f5857de090ee60c17370d98f99fe7cee8a9d1f39f2d0c915f17c71f24c520fb0adb155dcd7ab6cbfa02857b7a1eadbef350cc6def95dce54833171b4b6ad3556d42fd19028ff297815d4f4f11d4a275c3fda2208f2d534b746adfa08988d6df46e1f37e0beb1005c68aee77b9e4a53e", 0xa8}, {&(0x7f0000003100)="a37d87e80281320090e369728496f1a717e60e8464862e31981fa31e766a7078d010726eec3c3ddf908f77caf83fc3fbc5847a729a037f611c4ff450d5d2d839b58a12816859fcbeee15d269", 0x4c}, {&(0x7f0000003180)="84d905d08911b2d7815125dc8ec0a0b069ce1f9d8f3094353703484fa8d222eef8ecc610d584075ef17e7e75a3874bb6cca3f70232d284e4c54ab57bcf80c849f5fc6fca6ceb6ad4fe39a4aaea9709685ae551a7ec9946dea9bb428fcce8fcc13833793f45f7ca7e289f4eff1a87bf1126d10d8f4dbe2b341c957a", 0x7b}, {&(0x7f0000003200)="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", 0x1000}, {&(0x7f0000004200)="c4ddefa503d8bf3af22656614d487efd8f82b8dde5d83fc8b1748c", 0x1b}, {&(0x7f0000004240)="a600cb78bdc00fadaccb8fe9cd0007309839b433a1e903cd0c833e81fdd111f325bd953455ac41c27e68033f22e0c070a0e5f05e392c7f31dc38f647238f15b2712b0c05ddf4079b5573b045aa83b05300aa47bfc97d60f20832cc0561b973e2d2650c72387ba43a", 0x68}], 0xa, &(0x7f0000004380)={0x58, 0x10f, 0xfffffffffffff801, "928b51a1036f402d5ca7dba502c378021c9a692e4d2cfa456b72862dc1453e1bfca1601ba109cb1d3e066cdf8963d96228684362cca329d2fa191938647eba4f36"}, 0x58, 0x80}], 0x9, 0x80) 2018/04/13 09:12:36 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x800, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x14) recvfrom(r0, &(0x7f0000000000)=""/238, 0xee, 0x10022, &(0x7f00000002c0)=@hci={0x1f, r1, 0x2}, 0x80) 2018/04/13 09:12:36 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x88ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:36 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082", [[]]}, 0x1e0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="247a00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:36 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082", [[]]}, 0x1e0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:36 executing program 7: syz_open_dev$urandom(&(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x80) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x112) connect$l2tp(r1, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x2, 0x3, 0x1, {0xa, 0x4e21, 0x400, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x6}}}, 0xfffffd45) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e24, 0x7f, @dev={0xfe, 0x80, [], 0x1d}, 0x1}, {0xa, 0x4e24, 0x2, @loopback={0x0, 0x1}, 0x800}, 0xca99, [0x7, 0x1, 0x3, 0x400, 0x7, 0xfffffffffffff957, 0x10000, 0x20]}, 0x5c) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000100)) 2018/04/13 09:12:37 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x4400) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x40) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x5e7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x38ef}, &(0x7f0000000100)=0x8) 2018/04/13 09:12:37 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="24f000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:37 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x300], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:37 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:37 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:37 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) fchmod(r0, 0x80) r1 = msgget(0x3, 0x20) msgrcv(r1, &(0x7f00000001c0)={0x0, ""/4096}, 0x1008, 0x1, 0x1000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$void(r0, 0xc0045878) 2018/04/13 09:12:37 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) r0 = creat(&(0x7f00000005c0)='./file0\x00', 0x10) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000600)="e7b7d1bab5f8331cdf177bbe9a5d9442c63dfa83ec7735cda4029445c2ff2d92a7e9a2093bdec05359409d62c76512b2b5ef6c157f0fcefa411a6be186b4ebc1b8d7c961c22c1c16c6839bfeaa6bcc2c4ed8b89bcefa865d045b35b6e8bf2d", 0x5f) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x101, 0x40800) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x7) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r3 = accept4(r1, &(0x7f00000003c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000440)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000500)={r5, 0x200, 0x1}, &(0x7f0000000540)=0x8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r7 = accept4(r4, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r7, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r7, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r6, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:37 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082", [[]]}, 0x1e0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:37 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3200000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:37 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240007000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:37 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r0, 0x4) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) 2018/04/13 09:12:38 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc51", [[]]}, 0x1ea) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x7, r0, 0x1}) getpeername$packet(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x14) accept4$inet(r1, &(0x7f0000000100)={0x0, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x80000) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000001c0)={0x1, 0x3}) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000000c0)=0x101) 2018/04/13 09:12:38 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2800000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="24000b000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, r0) mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x40, 0x9) 2018/04/13 09:12:38 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000440)=0x14) r3 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f76feac3c2b0ac5c4f6208bc00000000000000000000"], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x29000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:38 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4a) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000904f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:38 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xf1dfcf5) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:38 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(0xffffffffffffffff, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc51", [[]]}, 0x1ea) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:38 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x17, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r2 = gettid() sched_setscheduler(r2, 0x5, &(0x7f0000000600)=0x82) r3 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8001, 0x2000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000001bc0)=[@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r0, &(0x7f0000000380)=""/193, 0x89, 0x10043, &(0x7f00000005c0)={0x11, 0xf7, r1, 0x1, 0x7, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xa3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}}, 0x0, 0x2, 0x40, 0x4, 0x9}, &(0x7f0000000100)=0x98) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000640)={0x3, 0x8}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)=0x3, 0x4) getsockname$ipx(r3, &(0x7f0000001c00), &(0x7f0000001c40)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000006c0)={r4, 0xff, 0x4}, &(0x7f0000000700)=0xfffffffffffffe5c) openat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x62) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000280)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000001b40)=[{&(0x7f0000000840)="32a3de660df7e3f20b4c4e02ef4f1fe435f37434a993fa746d33db7f1ae3fe75e8e0adb8dfe6b23e44840e54197282896db7c26accf023dba43177f241d9419d323f55d8ebdb950dbea368f905818617d0572cd78718d1876f606a5c42e5605108b9203b32b57cfbb07ac4caea", 0x6d}, {&(0x7f00000008c0)="08d64d5a68641061f26d513b0f7ff330f4fb7bdd", 0x14}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="f5f2ebbf185aba41767d32341557862b97838a8251923d12544cdfb970993f0b3e7b7722b0c709af269c672e1ef0014da38c8d2b923ae5ae5f1b3b50455cacaad01d4e1c2aaa0125b8e3931f30d91de8", 0x50}, {&(0x7f0000001980)="e19cfe1275802f0446367ced4f41273f8ffed00c076b14d6451c74e412dde0153c60d7129d7832f923035364ea2d3eddc4c5f805f8113ff5335b25e0bba77e8647623257a77b097ffb6041d02ad44261fce3f1c52041b886a605dc458e03dcd99772707580ba075fef9eab09e2265f49ec34f3d1d2d8d2d2357ca88b71d4337117b09e626fbf170c06404374f6278d59f16acaf70559c6fe4fd1f0322c07d283ccf19d312d97ad56abb843e53df846aab261a318c306d8903144d152c28ba923ce89ce5a954fc01684faa7e931bc63a4c1bbcb25b2b3e48c5e85b0f987370c3b7e6a90b50d346dc7d36f6e05a65faecd21d166", 0xf3}, {&(0x7f0000001a80)="1f69bf3bd99318934cb1bc728123da030b9752e4b8c7db06111be207965ace9f8ff72cd02baf2e6033f4e72dfe0ba3e94f8635e0ddb39d28ecf35727c5e4f3c168f240be9c4c019bbfd8833fbd0dbcc08bfd4a2b6a7c5f071d23ef95d105e6ecebdef4c6ddd54058fdb4c8110d91e52d5f2ca9105e0caa64adac9521568453feba10bd94bcc54c496488ae9537f868defa8a81d841060ee79e4c88320845946d0796b3fc8bc4d43aa7348857f97cedeb", 0xb0}], 0x6, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c81) 2018/04/13 09:12:38 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:38 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240700000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:39 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:39 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80) getsockname$packet(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x14) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) shmget(0x1, 0x2000, 0x78000000, &(0x7f0000ffc000/0x2000)=nil) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/99) 2018/04/13 09:12:39 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:39 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xf000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:39 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc51", [[]]}, 0x1ea) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:39 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r2 = accept4(r0, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="7c79ce09b1c0640263b32ab28d1f2509d1cbfb7febe4b58fcfb4545dfe475a44c99fd4808a6c00003fb8129fcd992a8dd59ad8cc6756be6056e95dfbfacace4902d4d1d2c0f2a7b721a35ea954353b5af948b96bfc06e3861426222499c3ac109e5d90453e9bac42ec56feffc104a0e33af63e28a9a489f9deb0b96f580000000050af5842fdfdfecf21f12a29cfd143ea62710f930931d0ad23007e56ef222d46a066af"], 0x1}, 0x1}, 0x0) connect$unix(r2, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r1, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:39 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240900000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x39, 0x2, @thr={&(0x7f0000000000)="19279722f4b3f5c16fc607cad700ba09d31f0869c67680695e37a369883e9d7b8adbdd1b7a88c986fa0f4d079e95a564592898e1f4dbd7e541c5ee399faf6c09dec614", &(0x7f0000000080)="eced63ffceb5eacc798082baffc9a2"}}, &(0x7f0000000100)=0x0) timer_getoverrun(r1) 2018/04/13 09:12:39 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xffffff84], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:39 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240800000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:39 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x111080, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x300) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x400001, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f00000001c0)=0x5) fcntl$getown(r0, 0x9) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) 2018/04/13 09:12:39 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:39 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:39 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:39 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3", [[]]}, 0x1ef) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240020000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:40 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x21], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) fgetxattr(r0, &(0x7f0000000100)=@random={'btrfs.', '\x00'}, &(0x7f0000000140)=""/55, 0x37) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f00000001c0)=0xfffffffffffffffc, 0x80000000, 0x3) pipe(&(0x7f0000000200)={0xffffffffffffffff}) setsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000240)=0xa0, 0x4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x440001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x0], 0x1, 0x8, 0x1ff, 0x7, 0x7fffffff, 0xffff, {0x40, 0x4, 0x80000000, 0x40000000, 0x6, 0x0, 0x8, 0x9, 0x5, 0x5, 0x0, 0x1000, 0x0, 0x1, "5c963a4c2646da2ed79994d449c0d7bf5dd204751598999a52e966b0e80be1c0"}}) 2018/04/13 09:12:40 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/61) 2018/04/13 09:12:40 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:40 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TTUNGETFILTER(r0, 0x801054db, &(0x7f0000000400)=""/224) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r3 = accept4(r1, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}, 0x1}, 0x0) connect$unix(r3, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r2, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:40 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3", [[]]}, 0x1ef) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:40 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x3, 0x6, 0x401, 0xb1], 0x4, 0x2dd0, 0x7, 0xe5, 0x8, 0xfffffffffffff248, {0xffff, 0x5, 0x1, 0x0, 0xfb96, 0x4, 0x2, 0x800, 0x5, 0x3a43, 0x4800000000, 0x4, 0xfffffffffffffeff, 0x5, "054d828ad8abaaa8c28bab86d17a8bf5ffb1b6316e66a91d9ff8fb4921ce3598"}}) 2018/04/13 09:12:40 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x46040) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/04/13 09:12:40 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000040004f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:40 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3c], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:40 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) 2018/04/13 09:12:40 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3", [[]]}, 0x1ef) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:40 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240500000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:40 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:41 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x1ff}, 0x1c) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:41 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/04/13 09:12:41 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x6c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:41 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x17, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r2 = gettid() sched_setscheduler(r2, 0x5, &(0x7f0000000600)=0x82) r3 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8001, 0x2000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000001bc0)=[@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r0, &(0x7f0000000380)=""/193, 0x89, 0x10043, &(0x7f00000005c0)={0x11, 0xf7, r1, 0x1, 0x7, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xa3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}}, 0x0, 0x2, 0x40, 0x4, 0x9}, &(0x7f0000000100)=0x98) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000640)={0x3, 0x8}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)=0x3, 0x4) getsockname$ipx(r3, &(0x7f0000001c00), &(0x7f0000001c40)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000006c0)={r4, 0xff, 0x4}, &(0x7f0000000700)=0xfffffffffffffe5c) openat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x62) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000280)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000001b40)=[{&(0x7f0000000840)="32a3de660df7e3f20b4c4e02ef4f1fe435f37434a993fa746d33db7f1ae3fe75e8e0adb8dfe6b23e44840e54197282896db7c26accf023dba43177f241d9419d323f55d8ebdb950dbea368f905818617d0572cd78718d1876f606a5c42e5605108b9203b32b57cfbb07ac4caea", 0x6d}, {&(0x7f00000008c0)="08d64d5a68641061f26d513b0f7ff330f4fb7bdd", 0x14}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="f5f2ebbf185aba41767d32341557862b97838a8251923d12544cdfb970993f0b3e7b7722b0c709af269c672e1ef0014da38c8d2b923ae5ae5f1b3b50455cacaad01d4e1c2aaa0125b8e3931f30d91de8", 0x50}, {&(0x7f0000001980)="e19cfe1275802f0446367ced4f41273f8ffed00c076b14d6451c74e412dde0153c60d7129d7832f923035364ea2d3eddc4c5f805f8113ff5335b25e0bba77e8647623257a77b097ffb6041d02ad44261fce3f1c52041b886a605dc458e03dcd99772707580ba075fef9eab09e2265f49ec34f3d1d2d8d2d2357ca88b71d4337117b09e626fbf170c06404374f6278d59f16acaf70559c6fe4fd1f0322c07d283ccf19d312d97ad56abb843e53df846aab261a318c306d8903144d152c28ba923ce89ce5a954fc01684faa7e931bc63a4c1bbcb25b2b3e48c5e85b0f987370c3b7e6a90b50d346dc7d36f6e05a65faecd21d166", 0xf3}, {&(0x7f0000001a80)="1f69bf3bd99318934cb1bc728123da030b9752e4b8c7db06111be207965ace9f8ff72cd02baf2e6033f4e72dfe0ba3e94f8635e0ddb39d28ecf35727c5e4f3c168f240be9c4c019bbfd8833fbd0dbcc08bfd4a2b6a7c5f071d23ef95d105e6ecebdef4c6ddd54058fdb4c8110d91e52d5f2ca9105e0caa64adac9521568453feba10bd94bcc54c496488ae9537f868defa8a81d841060ee79e4c88320845946d0796b3fc8bc4d43aa7348857f97cedeb", 0xb0}], 0x6, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c81) 2018/04/13 09:12:41 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058", [[]]}, 0x1f1) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:41 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240003000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:41 executing program 0: prctl$seccomp(0x16, 0x3, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x6, 0x4, 0x6}, {0xfffffffffffffff8, 0xfffffffffffffff7, 0x7fff, 0x5}, {0xfc0, 0x1, 0x0, 0x9}, {0x5, 0x84a, 0x3, 0x9}, {0x8001, 0x81, 0x6, 0xb005}]}) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100)='/selinux/mls\x00', 0xffffffffffffffff) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000380)=0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=@fragment, 0x8) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r4 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x200) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000bc0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000580)={0x5dc, r5, 0x2, 0x70bd29, 0x25dfdbfb, {0x1}, [{{0x8, 0x1, r0}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x40}}, {0x8, 0x7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7f}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0x5, 0x100000000, 0xb5, 0xfffffffffffffffa}, {0x6, 0x62, 0x1, 0x9e}]}}}]}}, {{0x8, 0x1, r0}, {0xc8, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r1}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x80}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r0}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r0}, {0x134, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xfffffffffffffffc}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x6}}, {0x8, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r0}}}]}}, {{0x8, 0x1, r1}, {0x9c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r0}, {0x7c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r0}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r0}, {0xb8, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r0}}}]}}]}, 0x5dc}, 0x1, 0x0, 0x0, 0x80}, 0x801) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000c00)=0x10000) pipe(&(0x7f0000000100)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000280), 0x4) r6 = accept4(r2, &(0x7f00000002c0)=@alg, &(0x7f0000715ffc)=0x13, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5980f48cf058bc76bae56d408b801f4d8534b689723ccf0f38e09206e916eaf747a922a4c56e7eacdc5939df2fc8a733306d8984836f8797878395b4b5723d278e0f7fa524b3c04b30cdf6d93c267d48930cfaa9806b0df36ccbaea2a810c4771573e24206a2bbd5d0f36e5e5c88bdba97318a71297f1ea0e25f37664f4abd305d3dd9818d1aed6e27813ab5110d32150ed930b83cfb627ef62f0aee1d6faeddc17cb3a7b36c1271720b636e65d70fea659009a4119a5b20761bc88bc6b24836f0accb"], 0x1}, 0x1}, 0x0) connect$unix(r6, &(0x7f0000000000)=@abs, 0x6e) recvfrom(r3, &(0x7f00000001c0)=""/154, 0x9a, 0x40000140, 0x0, 0x0) 2018/04/13 09:12:41 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:41 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40000000084000) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0x80000000, 0x100000000, 0x80000001, 0x81, 0x6, 0x976e, 0x0, 0x7, 0x80, 0x4}, 0xb) r2 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x7ba4}, @in6={0xa, 0x4e23, 0xff, @remote={0xfe, 0x80, [], 0xbb}, 0xba}, @in6={0xa, 0x4e24, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, @in6={0xa, 0x4e22, 0x1, @loopback={0x0, 0x1}, 0x6}, @in6={0xa, 0x4e22, 0xec, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x4}, @in6={0xa, 0x4e21, 0xe459, @empty, 0x178e}, @in6={0xa, 0x4e21, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x5f7b}, @in6={0xa, 0x4e23, 0x7d34, @local={0xfe, 0x80, [], 0xaa}, 0x100000001}], 0xe0) 2018/04/13 09:12:41 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2b00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:41 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x3, 0x5}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) 2018/04/13 09:12:41 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000002504f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:41 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 2018/04/13 09:12:42 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:42 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="241006000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:42 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x17, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r2 = gettid() sched_setscheduler(r2, 0x5, &(0x7f0000000600)=0x82) r3 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8001, 0x2000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000001bc0)=[@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r0, &(0x7f0000000380)=""/193, 0x89, 0x10043, &(0x7f00000005c0)={0x11, 0xf7, r1, 0x1, 0x7, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xa3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}}, 0x0, 0x2, 0x40, 0x4, 0x9}, &(0x7f0000000100)=0x98) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000640)={0x3, 0x8}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)=0x3, 0x4) getsockname$ipx(r3, &(0x7f0000001c00), &(0x7f0000001c40)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000006c0)={r4, 0xff, 0x4}, &(0x7f0000000700)=0xfffffffffffffe5c) openat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x62) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000280)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000001b40)=[{&(0x7f0000000840)="32a3de660df7e3f20b4c4e02ef4f1fe435f37434a993fa746d33db7f1ae3fe75e8e0adb8dfe6b23e44840e54197282896db7c26accf023dba43177f241d9419d323f55d8ebdb950dbea368f905818617d0572cd78718d1876f606a5c42e5605108b9203b32b57cfbb07ac4caea", 0x6d}, {&(0x7f00000008c0)="08d64d5a68641061f26d513b0f7ff330f4fb7bdd", 0x14}, {&(0x7f0000000900)="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", 0x1000}, {&(0x7f0000001900)="f5f2ebbf185aba41767d32341557862b97838a8251923d12544cdfb970993f0b3e7b7722b0c709af269c672e1ef0014da38c8d2b923ae5ae5f1b3b50455cacaad01d4e1c2aaa0125b8e3931f30d91de8", 0x50}, {&(0x7f0000001980)="e19cfe1275802f0446367ced4f41273f8ffed00c076b14d6451c74e412dde0153c60d7129d7832f923035364ea2d3eddc4c5f805f8113ff5335b25e0bba77e8647623257a77b097ffb6041d02ad44261fce3f1c52041b886a605dc458e03dcd99772707580ba075fef9eab09e2265f49ec34f3d1d2d8d2d2357ca88b71d4337117b09e626fbf170c06404374f6278d59f16acaf70559c6fe4fd1f0322c07d283ccf19d312d97ad56abb843e53df846aab261a318c306d8903144d152c28ba923ce89ce5a954fc01684faa7e931bc63a4c1bbcb25b2b3e48c5e85b0f987370c3b7e6a90b50d346dc7d36f6e05a65faecd21d166", 0xf3}, {&(0x7f0000001a80)="1f69bf3bd99318934cb1bc728123da030b9752e4b8c7db06111be207965ace9f8ff72cd02baf2e6033f4e72dfe0ba3e94f8635e0ddb39d28ecf35727c5e4f3c168f240be9c4c019bbfd8833fbd0dbcc08bfd4a2b6a7c5f071d23ef95d105e6ecebdef4c6ddd54058fdb4c8110d91e52d5f2ca9105e0caa64adac9521568453feba10bd94bcc54c496488ae9537f868defa8a81d841060ee79e4c88320845946d0796b3fc8bc4d43aa7348857f97cedeb", 0xb0}], 0x6, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c81) 2018/04/13 09:12:42 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x6c00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:42 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058", [[]]}, 0x1f1) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:42 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7, 0x80040) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 2018/04/13 09:12:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x90080, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x100, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000140)=0x8, 0x4) ioctl$KDSETMODE(r1, 0x4b3a, 0x1) r3 = dup2(r1, r1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000080)={0x3ff, 0x1, 0x7, 0x5, &(0x7f0000000040)=[{}]}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x11}, 0x3}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000002c0)={r4, 0x8, 0x30}, 0xc) 2018/04/13 09:12:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:42 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:42 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240f06000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:42 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x17, 0x400) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) r2 = gettid() sched_setscheduler(r2, 0x5, &(0x7f0000000600)=0x82) r3 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x8001, 0x2000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000001bc0)=[@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@loopback, @in=@multicast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) recvfrom$packet(r0, &(0x7f0000000380)=""/193, 0x89, 0x10043, &(0x7f00000005c0)={0x11, 0xf7, r1, 0x1, 0x7, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xa3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x8001, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}}, 0x0, 0x2, 0x40, 0x4, 0x9}, &(0x7f0000000100)=0x98) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000640)={0x3, 0x8}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000002c0)=0x3, 0x4) getsockname$ipx(r3, &(0x7f0000001c00), &(0x7f0000001c40)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000006c0)={r4, 0xff, 0x4}, &(0x7f0000000700)=0xfffffffffffffe5c) openat(r0, &(0x7f0000000680)='./file0\x00', 0x0, 0x62) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r4, 0x6}, &(0x7f0000000280)=0x8) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) pwritev(r3, &(0x7f0000001b40)=[{&(0x7f0000000840)="32a3de660df7e3f20b4c4e02ef4f1fe435f37434a993fa746d33db7f1ae3fe75e8e0adb8dfe6b23e44840e54197282896db7c26accf023dba43177f241d9419d323f55d8ebdb950dbea368f905818617d0572cd78718d1876f606a5c42e5605108b9203b32b57cfbb07ac4caea", 0x6d}, {&(0x7f00000008c0)="08d64d5a68641061f26d513b0f7ff330f4fb7bdd", 0x14}, {&(0x7f0000000900)="997d21ba38a733915865ab8d8149ab073d4438c65549a38e5a7bede24769fa378d7b51b8416bed986b783cf29896a8392676c61e60a1603f9a5159069831d20f57ba9390e45cc55bf7108ad0ae808ea3e41b44c26286718ab72aa7229555346afa07b9635c6c86ddc19a57dfcdaa0caf4ff64a0f106f22d2d63b89a68fa9b2b61659cb5add10918b985c619430d12398498c437e213b6624d2759009a1b793d5c08233bc6024f314844048388bc93e4c7614339cb2e5490d35ffb3a3fd2362b8aa79c1574c8eccd25e6be10d581ff0130341e09848909b7e81882c5f0abc545f7558421db05f51b957b19ef5f67ac8e7041a77a72b310de33192fe2718475172277c2eeba544df1d5593d20a076381d90602337fd3854ad3fb478a23b18e8ddebf7ba8ca013a4da9f42c22acfeb7cf049005985926cef5ebd04d4516326ead3de5802dd96b98d05cd5378d3dfabc4dc445d97dc83c05afecd5cb2e75e37ebc3a61870b5ddce3b427b64430bfbd54fccb7fb95206a86de3c856b56a921f4115e627ff106378922b71390f06ffd5b0fca8a57dd5b2de97724bdccac79edfbc13193cb02daae82b31199c284c47d8902c057680b82ccdd174feb1216b985ee726b2b2734e27339cebbd5ed04ccad066b731fabac9ee60632db43ecc9e85ebbe2ce7f7f64d2de74a7fea9d66be1fd33f65e759eac575f9307a34b7cc9a7fa2ae5aae99435efcb6804b7f66bbffb5e983144195032160639886b95ff2c61260e04e5d6f14c1d7e8cd8bcb591217e24f8815a5af47ea08345d7c320a4535dbcc39e984818cb5131df0b97e00d82393719ad2be9ed7ed7f147a18c48cc932091b80e6e7426693b570709607518058b0be8f86f97f994e61a680720fa3a4277728b88c8947d171947296054e4193a70328c77a3c5dee1e7105d9d2c5c292169f31a8c05362380eb90fa4f3695c679b751f6e60f83580738f305ab6e943434be29d0dfb260d2fe4159853af3698090038426a9776a8fd825f96556fc1f8e877db74831dcd8bc515a7fef2efc6109f61ce570f5775743a746e684d6f51602e6f5fd7671425698da72699ed44fe7400052548e1fbd0c2cce011e2ff8d817f195efdd94c3bbebb565a6def306ae42441ff1e3150f4529e4fad0967844b0c548571229ea3e78bfdf2659b688516d3e3a93b2b569420ee9ef833e1452bd4ea10fe003bdbc20cf93bcdc293c3f4986d585fd43a6c9c59ede976e6673bba43914fdca40a3f4b6d457527634f9bf429673cc550262ff8bd1c8fe02a98626782d69b86aad971d6045fbc8bc78a09d535a8fc50d0115b7f6c052de0014bbebf91c8358adc7ef4dca9c28040de4f73e5816d2e7403083699d87ae060368d827b1b05eb039b1f795751be76b961fbf2c2c7a9d1ffe84c8c712cc24b6078f33e713ecc90d83e408a6b299325a1e55d999a670b7aad7547ef036d8aa622b974f80eebf61fe099630d6f93ae4311f413aecdbcec52cbe42f64907e35798445bad11ce4a9b0c2c7ebdd5d38eb48eb7d9454e76fe97212a44561048b4176c3685fcbe2bacea07d28dedab043ba31fdf5e96191ab3aa510b4eabfef04a2fc5c2d262b4aadf75f1e71351abaf9c901ab4dce35c6869ca467bef49255f11d8d603098ac172634ad72a11d60197d3ea844f348891ce682aebf191c744395a337aa0adc05219ac2722f59eb914166af6bc09671bb55c7e3498e3b9a0d7ad6285bcea285d0e6f4241155ec2cc0c222204c52f4a82388c95c999307c4e6f493aead952a66d4c487893be79e19f44dc58ffb5919879832db9a332b4e5dafeb635e14993115b74f83ab4fc58f1354ea297aba8a3751c7a74584ff1f18dbcda4e53cacc6708a681d8fb5d4c9a759b3825d09fa8e2c43acc0e2f54911901efa34d3ac26bc5ae6e2c339cf17e2727cac7529f5cf1de9014d0fe12fcea5a371bfd5810587110ed7e8ef122a54030e8d36faaec0f856ca1c56952ed1385f3ca2850e0c9819aeb4b55381d3da2215895d987ae0ee10f2fb991ec3eb0adde89df7b280071c37db2538735e06f780affbf4df813cd070fa3dcdd09d8ff2214669c588eb2f50255228d12cffe716c0ed987ae67bc04b50bf1d3d79f94e30ea617b1b257ddeb10077ea5710a55e65e3436c789beb545039741f333c0a6d84da0cf8fa986152f26ffda4d8462afa10250fa9423958ade39ff2e8a5fb39bcb12053cec6ac2d650adaf018b9cce3ac30889a3e91331e635cf50dc1624c2fc661b5bc1634cbdf44a86972826bb5ea8d73cd87521b8924c8f94e0b1af38049cfb37d8c2a617f1900d0178891e1103905010f6708b0e05384c4177b24bca5a5db65f63932731eb42f27453d109b393b3fdf94ff4a1a00bef954849642099cc26a46edc75aea6123bc57b27852c67bd8918b8805c678a8f53b39192cc587ca1f99ab073599bae4e323392c9d2068177d95ee10927b848082b430fb73215e98b29c8b7d7ee12ad0d7994dab8057ca55a02efba28b7edc34a2bc87f6f4bf7473f6270d24fc5fe1bc308f8bfa44502455d6ccdfb434f88a3bfe10beb3056e602d0d0d449e60aab7bd0f8109b24178b98bef5dce070c808e88cf4eb15ccf993b42963f46c38f5f2585c7cd10f11f749627d4b9024953d60a81906e400282fa1a9d9084c09f1be40207ed82dc927f21d14304f51e780ca07e4ca994ba5a4eda598855bd04202743d654c68f308b88068dda355bb02f9d93e5f57cbe2ab57181bc5c1c3188f1241e454ed46a2011de7c25ccd59181285f4307608b198b749b7a9fd55d0760312b76864e29fbc24b2704ae76dd49edaf16c3cfb492a31c8ff6b977fe464fcd4e4d3501938d1bcddeaf2874df6c8cbfa106dc79a5b1c6a940a619768e41aa0be44083305d3cbef3631c2d33d279eda8bc1ff13e62f900ff85381121c2e4c8ed261efa80756a4e3610dcd79b601524cd3237db91337e5bd1c8d07ff1b2d920482f8328a50c67814e284726aae0a1fb23893008fa11d91807841053b0a19459930e414d6e6cd483dd3da65a414598a1a9d0485e1e5bb5d121cf7b241c0a00b5157246d24cacb1b36fab7208a63c3586469f5fb977f5b722853d4cea53bca196106c45d25ec43a24279d37dc37a7e98fff0f4440a76916ceb92b2cd2fd6e9c880e0e52c1c220615b3014067d8ad8db5e16c83adc57d9d2ee123e70e4a95352423f27e189e184e4bae85aa092f2b33d26e3cd986736bf8de2a06321b9c5374ab27a86fcf13d9d61087821936d954f1fcd3211abb92b269875d71f28a3f7526b25f5de55dad62286322d9da6a1299f57d3d980a1a27b03299b4aa9323a704dfca1a24c1461ab68cccc0651209ad591e1d5c3d4ae5f5d47c8ef7842e7bb99a008ae1f20e912c42aa065134bd535a9876d730dc807cc896d7d9237e3ac06884e52dc400a7b001c2edcbe83634734b00c68cebd21f2d55b1cfa620f3e45ae4b3c7c7c4ad6ff853e3ec3c814a5b2e3122776a4df64435054ef337a26aa975279c82caa2e1bf4464795ebf360384cfd160164bb011bafd10d6bb41bb57fee5f06e096df7e3e0b10311d6902799b44fdbfdfaf0271ddbac77f5d420f6f59dc5def0ee4c61708ecddb50a2aadf47ee046869bc8ccdbd9c90352c8b6ed7d149b3242f25680fe5e88320755215bc1ff24d71ad49b59d40ca1258f68c6a2c224561e9f70ee252126b6a335081ef67afad1a619dcdabb42a8288d075c2f750cad6b9628163cedba0457dfbc9905bb5294701b8d128eb06b3f112874bd2ba0eb4b5df6f88d505b992bc28741f4bcb3a313bb47679e73200f77e60c339a89ad8753e239e78a2db1fe404997e1c39e498a5664ef8fec389f057bdef9971856cb4c24f96385a6810ab321b2b2bc287210b8cd04d8971269d57a777913a2fc660dc2dc5d690816b7792d47eefb7dbe1f24c72888959c3c67dd7fdef78206e940ef40c68598ba6076bf6fb6af188cb9826aaca7361304d89ee3d55c489347ccd8e3d82051ddb52224d7db2d9a8c24b323e7028392260b1e506d49393bdf0cd943349931e4cd2b6c17db80b69583aa7322affc62b649d1dd96d2f3ba8dec63c3ebbe5a9bb397dd648f54423f9a662b6965a797a01a00e548e46ffe66bd8306540fdddb7b38676ef938848ec119e74afaef583d91ec8795506129dc3bce3d8b6a90075cd54d2b95643f156c23d99274ff6690ffa7eeb7cbc85ff085ac9fa6deaab2168b7212fd90979b57bfee8da224377e6916225aa2eaf31a8ed2baee3c203abba9f465d48d27eaefaae0f57895417ebbea7109100d7670e5749a1f1c4a1878212e620cd7d3d218b8b1b37e6436c1c9b15495f2a998bf30045624b2070308bf34a91444faafdb3082cdfecaa38f2933bf391c251e68de19dd25f38afea8f8d9cfd966f0e39806a2fecfab544a6cfd76dcbdd0de2ea3adda6f88b83b7e15e1ed839208d8bfa558b6a3aedadf9743f78e70e03d3be23932a6306a2e0c43ed2fe156e2bc32d35df23cc9e2cd8698c4d928afd0dc0052523b0a520c9030e7a850109db17c93af8cf88475824f92df0446a9610a012e7c6708702082be95b1e0efa475733d6a3e17ce07b51af4dd8c5b40e46605abfb8e9f101e470697d116015f4fd769b5741852303b4eb4ba95412f31dded5fbdafad3b2c9a0afe21c601ab30ca2c423d5443f897a321e3b4e4b7fe0db7c1ac85c6fc66bf0ab7be2c9178fb4e1895fe798e562f3f413bb778d665c42c7ad0ec77181c91c14506fd4478de458c8f418115798f267e95920b6de2867c6617fd9702ef857fd56d7f7dada3d750553e651d835576e904239ade3f67540bce63572f3a3fecc47ef69a790b2273df0fcf7249008f18985b577e0b97c99867a053c958654e58de7b42aa121c0966a49e1d5d4901c0cd7dbe53e5d3c326b3911c73bf9a1433dd81698f56693cdd7f42c73268bca5b4c55acc98c462c259fcdc4a544b0d13586b2460b276b480b16092b04fc14280e363fc9948a3d6c8b0b961fc4fa714faa1fcaea291642bf088d2cd9ac1e44a350bdb429f6cb07721fb5976ab975a2bea2c0b0ec1f793a790538b95a8bfcd4d1f97c48cfd5b6276acb9339c32cd81ab20d431412259cf0d71661285fee724c5524ba6447cb1efe7f2bc0e1fc44779b28b26860597630a2d2b8a2c9ef488465fa4d9c257978d1f33fc11d9991a0792fb0f2dee36190879be91466b5ccb020d6b7334eec7f501c49944aeb29c12ce098e6e1ef7f7b2397c729596719140702c304949e75f81791256676675641a7bda2d2730647a582edb9d0f413b947e9f06c873d3d936370d3d3049d42076d13712a6f788edf800fc02f36e05462bbea136083fe6b55d612995443b19763aba60209d42d3369f06eb553306af5909729a0124a8aa2df4331814b4bed08d1976fccbe579b172e3b2bfee6e0dd2dc481b210a98962843da16761188841cafcb7a0ec47949ad37d4ab4562f947c3bb93eb0a3637203926617c710e8aa2b3954362eb47e174ff87d3df86af11aef4683feaf08ab706ce1e1ea8b847be11e2893955b534cc26a04082614e4b4bc4740d28b1af050c8a665c2d7755c0f195f60a97d79bef848490c5b00cfbfe081122f43e2c53501f08fe45768d4445ea541b12d7a83e072f1fcfc8bccd00f7bff93fb7cba280985d839e19689ef20c1b04634c09f8d5cf40075f98572dd1864853bcb32f46438113351020494f7f079abc066ce67e87fa9c5698c531a00b3cb14da2bd155717a9225e", 0x1000}, {&(0x7f0000001900)="f5f2ebbf185aba41767d32341557862b97838a8251923d12544cdfb970993f0b3e7b7722b0c709af269c672e1ef0014da38c8d2b923ae5ae5f1b3b50455cacaad01d4e1c2aaa0125b8e3931f30d91de8", 0x50}, {&(0x7f0000001980)="e19cfe1275802f0446367ced4f41273f8ffed00c076b14d6451c74e412dde0153c60d7129d7832f923035364ea2d3eddc4c5f805f8113ff5335b25e0bba77e8647623257a77b097ffb6041d02ad44261fce3f1c52041b886a605dc458e03dcd99772707580ba075fef9eab09e2265f49ec34f3d1d2d8d2d2357ca88b71d4337117b09e626fbf170c06404374f6278d59f16acaf70559c6fe4fd1f0322c07d283ccf19d312d97ad56abb843e53df846aab261a318c306d8903144d152c28ba923ce89ce5a954fc01684faa7e931bc63a4c1bbcb25b2b3e48c5e85b0f987370c3b7e6a90b50d346dc7d36f6e05a65faecd21d166", 0xf3}, {&(0x7f0000001a80)="1f69bf3bd99318934cb1bc728123da030b9752e4b8c7db06111be207965ace9f8ff72cd02baf2e6033f4e72dfe0ba3e94f8635e0ddb39d28ecf35727c5e4f3c168f240be9c4c019bbfd8833fbd0dbcc08bfd4a2b6a7c5f071d23ef95d105e6ecebdef4c6ddd54058fdb4c8110d91e52d5f2ca9105e0caa64adac9521568453feba10bd94bcc54c496488ae9537f868defa8a81d841060ee79e4c88320845946d0796b3fc8bc4d43aa7348857f97cedeb", 0xb0}], 0x6, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c81) 2018/04/13 09:12:42 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) 2018/04/13 09:12:42 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x0) r2 = shmget(0x1, 0x4000, 0x54000008, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) set_robust_list(&(0x7f0000000100)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x5}, 0x18) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x83ca, 0x4) 2018/04/13 09:12:42 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:42 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xf0ffffffffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:42 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240006000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:42 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058", [[]]}, 0x1f1) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058", [[]]}, 0x1f1) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:43 executing program 7: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$KDENABIO(r0, 0x4b36) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 2018/04/13 09:12:43 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3a000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:43 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000504f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:43 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3705861", [[]]}, 0x1f2) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="246000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:43 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:43 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8200, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x20000000000000f3) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x6, 0x2000) 2018/04/13 09:12:43 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x200000, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:43 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3705861", [[]]}, 0x1f2) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:43 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240f00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:43 executing program 7: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) 2018/04/13 09:12:44 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2f00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:44 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) pipe2(&(0x7f0000000000), 0x4800) 2018/04/13 09:12:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="1eda69d4a1e39eda7f002bdf57c4df6e", 0x10) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100000000, 0x80000) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=""/156, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x5, 0x0, 0x8, 0x1, 0x9, 0x2]}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f00000000c0)={@empty, @local={0xac, 0x14, 0x14, 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000280)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, r3, 0x503, 0x70bd27, 0x25dfdbff, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xb}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) 2018/04/13 09:12:44 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3705861", [[]]}, 0x1f2) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:44 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:44 executing program 7: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x11) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000040)=""/216) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) 2018/04/13 09:12:44 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240303000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:44 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x6c000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:44 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="24004c000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:44 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet(0x2, 0x6, 0x52) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x99, "b463baf1b0f6baa55df48dce7b857d93b7faa0ab663271fdfcf232a424cdae1fbb65bbf1cbdac15dd441ef486c50d75bffd18947cde4a32c62d158ace089ce2720b9e9b2241c8c74026fb8ad0b19ab8d17f77fe8e4a49ba822a19ce866275e2446b3025732481e064059342f103390becc210dddc2c298e5e278a2218790796b08eb09f283072727ca8dd7973ffcef7ef8027ec11f5865bc4c"}, &(0x7f0000000140)=0xa1) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r3, &(0x7f00000002c0)=0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100)=0x8, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x2, 0x3, 0x7fff, 0x5, 0x6}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r4, 0x4) r5 = openat(r0, &(0x7f0000001280)='./file0\x00', 0x1e1500, 0x3e) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000000)={0x20000000}) setsockopt$inet6_dccp_int(r5, 0x21, 0x3, &(0x7f00000012c0)=0x8, 0x4) 2018/04/13 09:12:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x301002, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:44 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="1eda69d4a1e39eda7f002bdf57c4df6e", 0x10) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x100000000, 0x80000) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=""/156, &(0x7f0000000100)=0x9c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x6, [0x5, 0x0, 0x8, 0x1, 0x9, 0x2]}, 0x10) setsockopt$inet_mreqsrc(r1, 0x0, 0x2e, &(0x7f00000000c0)={@empty, @local={0xac, 0x14, 0x14, 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000280)=0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x100, r3, 0x503, 0x70bd27, 0x25dfdbff, {0xb}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x81}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xb}}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r2, 0x4}, &(0x7f0000000300)=0x8) 2018/04/13 09:12:44 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x28000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:44 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:44 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000804f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:44 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac3705861", [[]]}, 0x1f2) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:44 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x3f8, 0xffffffff, 0x2a0, 0x2a0, 0x0, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@local={0xac, 0x14, 0x14, 0xaa}, @broadcast=0xffffffff, 0xffffffff, 0xff, 'team_slave_1\x00', 'bcsf0\x00', {0xff}, {0xff}, 0x88}, 0x0, 0x188, 0x1c0, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x8000, 0x8, 0x1}}, @common=@unspec=@conntrack3={0xc8, 'conntrack\x00', 0x3, {{@ipv4=@loopback=0x7f000001, [0x0, 0xffffff00, 0xff0000ff, 0xffffffff], @ipv4=@local={0xac, 0x14, 0x14, 0xaa}, [0xff, 0xffffff00, 0xffffff00, 0xffffffff], @ipv4=@broadcast=0xffffffff, [0xffffffff, 0x0, 0xffffff00, 0xff000000], @ipv6, [0xffffffff, 0x0, 0xff000000, 0xff0000ff], 0x401, 0x78b, 0xbf, 0x4e21, 0x4e21, 0x4e22, 0x4e23, 0x2000, 0x200}, 0x100, 0x100, 0x4e24, 0x4e20, 0x4e21, 0x4e22}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x1, 0x8000, 0x3ff}, {0x0, 0x0, 0x3f}, {0x7, 0x13b, 0xffffffffffffde22}, 0x4, 0x381}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x20}, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0xff, 'eql\x00', 'veth1\x00', {}, {0xff}, 0xaf, 0x3, 0x1}, 0x0, 0x98, 0xe0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 'veth0_to_team\x00', 0x1}}}, {{@ip={@rand_addr=0xffffffff, @broadcast=0xffffffff, 0xff000000, 0xffffff00, 'veth0\x00', 'bridge_slave_0\x00', {0xff}, {0xff}, 0x7f, 0x2, 0x44}, 0x0, 0x98, 0xc0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x458) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) io_setup(0x6, &(0x7f00000000c0)=0x0) semget$private(0x0, 0x3, 0x721) io_destroy(r2) 2018/04/13 09:12:44 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x14000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 301.041460] sctp: [Deprecated]: syz-executor7 (pid 20191) Use of int in maxseg socket option. [ 301.041460] Use struct sctp_assoc_value instead 2018/04/13 09:12:44 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240009000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:44 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 301.131908] sctp: [Deprecated]: syz-executor7 (pid 20224) Use of int in maxseg socket option. [ 301.131908] Use struct sctp_assoc_value instead 2018/04/13 09:12:45 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 2018/04/13 09:12:45 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x7}, &(0x7f00000001c0)=0xc) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:45 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:45 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240a00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:45 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:45 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:45 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:45 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x84ffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:45 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240b00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:45 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 2018/04/13 09:12:45 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x80000001, 0x4000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000100)={0xa8a1, 0x2, {0x0, 0x1, 0x200, 0x2}}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000080)={0x3}) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000040)={0x64, 0x1a7c, 0x0, 0x9, 0x9, 0x2}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:45 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:45 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3300000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x7}, &(0x7f00000001c0)=0xc) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) 2018/04/13 09:12:46 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 2018/04/13 09:12:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0xffffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240074000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:46 executing program 3: r0 = memfd_create(&(0x7f0000000180)='/dev/loop-control\x00', 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="092560c357bd942e71c7f71344590df9c55a2e17ced37b1e52086971e08858f6895f3718dd89e8ec9452ab4866ac00b15da5e5e12170da6b710d38ff69ef8190bd98b154fe463e6703fb0790b83f5778f000528da6d548817250d9d5f283", 0x5e) clone(0x40002000, &(0x7f0000000080)="ef431676c46ab6a4e64413aed9a16d2ae9deb838852243851888562e557de328a867dced3eefbd0d85528dead284636402fac2a23cb234aa8e197b19c2dfdc6666307c4d32fa408065e3c51d9ab6", &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)="e645a9d2291318b6c6c6c0fdb693543e46d43436156cc4aaac38e123fd1d7bfd871c6781755963e859c1f4a90669cae83ea18ab0c6cd54c73fcd542ba4d9260cefdf19f6ecde45ae379cf7c2ed998e8a32b9137fad285932b8695e771b9dd9d093ff04a4124fa7fde1b399ef33532ba7ce34f8cbe7e44f7fa51f7b247dbdca53a68adf65735212b73427faca4b86c2585cc7629624ce4b526b203fdead8ab660ae592eb789ea174f1bd3ce03852deaca17f53f3bc963e9912c3c6d7192ec06") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c81) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x60000000}) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="2475b6aa1904f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 302.554574] IPVS: ftp: loaded support on port[0] = 21 2018/04/13 09:12:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x300000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) dup(r0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000204f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:46 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x88ffffff00000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x0, 0x0, 0xef, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="24006c000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:46 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:46 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x11000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240610000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 302.987782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 302.990590] IPVS: ftp: loaded support on port[0] = 21 2018/04/13 09:12:46 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = shmget(0x1, 0x2000, 0x200, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) r2 = dup(r0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000000)=0xffffffffffffffaa) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000040)=0x2) 2018/04/13 09:12:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2c00], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:46 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="39c51042c4ce0f52000001001100"], &(0x7f00000000c0)=0x12) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x5, 0x20}, &(0x7f0000000140)=0xc) pkey_alloc(0x0, 0x1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) fcntl$setstatus(r0, 0x4, 0x400) 2018/04/13 09:12:46 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:46 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240000000604f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:46 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c", [[]]}, 0x1f3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:46 executing program 5 (fault-call:8 fault-nth:0): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:47 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2800], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 303.442509] FAULT_INJECTION: forcing a failure. [ 303.442509] name failslab, interval 1, probability 0, space 0, times 0 [ 303.453807] CPU: 1 PID: 20453 Comm: syz-executor5 Not tainted 4.16.0+ #2 [ 303.460653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.470015] Call Trace: [ 303.472615] dump_stack+0x1b9/0x294 [ 303.476256] ? dump_stack_print_info.cold.2+0x52/0x52 [ 303.481452] ? debug_check_no_locks_freed+0x310/0x310 [ 303.486647] ? debug_check_no_locks_freed+0x310/0x310 [ 303.491846] should_fail.cold.4+0xa/0x1a [ 303.495917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.501026] ? debug_check_no_locks_freed+0x310/0x310 [ 303.506203] ? find_held_lock+0x36/0x1c0 [ 303.510261] ? check_same_owner+0x320/0x320 [ 303.514573] ? rcu_note_context_switch+0x710/0x710 [ 303.519492] __should_failslab+0x124/0x180 [ 303.523713] should_failslab+0x9/0x14 [ 303.527497] kmem_cache_alloc_trace+0x2cb/0x780 [ 303.532152] ? kasan_check_read+0x11/0x20 [ 303.536284] alloc_pipe_info+0x16d/0x580 [ 303.540332] ? pipe_read+0x940/0x940 [ 303.544035] ? __fget+0x40c/0x650 [ 303.547478] ? expand_files.part.8+0x9a0/0x9a0 [ 303.552042] ? find_held_lock+0x36/0x1c0 [ 303.556090] splice_direct_to_actor+0x6e7/0x8d0 [ 303.560744] ? pipe_to_sendpage+0x3f0/0x3f0 [ 303.565046] ? lock_downgrade+0x8e0/0x8e0 [ 303.569181] ? do_splice_to+0x190/0x190 [ 303.573145] ? rw_verify_area+0x118/0x360 [ 303.577279] do_splice_direct+0x2cc/0x400 [ 303.581417] ? splice_direct_to_actor+0x8d0/0x8d0 [ 303.586251] ? rw_verify_area+0x118/0x360 [ 303.590384] do_sendfile+0x60f/0xe00 [ 303.594086] ? do_compat_pwritev64+0x1b0/0x1b0 [ 303.598653] ? __might_sleep+0x95/0x190 [ 303.602616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.608138] ? _copy_from_user+0xdf/0x150 [ 303.612269] SyS_sendfile64+0xdf/0x190 [ 303.616141] ? SyS_sendfile+0x1d0/0x1d0 [ 303.620102] ? do_syscall_64+0xb7/0x9d0 [ 303.624056] ? SyS_sendfile+0x1d0/0x1d0 [ 303.628016] do_syscall_64+0x29e/0x9d0 [ 303.631887] ? vmalloc_sync_all+0x30/0x30 [ 303.636029] ? _raw_spin_unlock_irq+0x27/0x70 [ 303.640506] ? finish_task_switch+0x1ca/0x810 [ 303.644989] ? syscall_return_slowpath+0x5c0/0x5c0 [ 303.649902] ? syscall_return_slowpath+0x30f/0x5c0 [ 303.654818] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 303.660167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.664996] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 303.670170] RIP: 0033:0x455319 [ 303.673339] RSP: 002b:00007f78fd9d8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 303.681030] RAX: ffffffffffffffda RBX: 00007f78fd9d96d4 RCX: 0000000000455319 2018/04/13 09:12:47 executing program 0 (fault-call:4 fault-nth:0): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 303.688282] RDX: 0000000020d83ff8 RSI: 0000000000000016 RDI: 0000000000000015 [ 303.695532] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 303.702780] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000017 [ 303.710031] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 [ 303.812347] FAULT_INJECTION: forcing a failure. [ 303.812347] name failslab, interval 1, probability 0, space 0, times 0 [ 303.823946] CPU: 1 PID: 20474 Comm: syz-executor0 Not tainted 4.16.0+ #2 [ 303.830788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.840120] Call Trace: [ 303.842694] dump_stack+0x1b9/0x294 [ 303.846309] ? dump_stack_print_info.cold.2+0x52/0x52 [ 303.851488] should_fail.cold.4+0xa/0x1a [ 303.855529] ? kasan_check_write+0x14/0x20 [ 303.859747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 303.864837] ? debug_check_no_locks_freed+0x310/0x310 [ 303.870008] ? graph_lock+0x170/0x170 [ 303.873797] ? graph_lock+0x170/0x170 [ 303.877579] ? __lock_acquire+0x7f5/0x5130 [ 303.881797] ? find_held_lock+0x36/0x1c0 [ 303.885845] ? __lock_is_held+0xb5/0x140 [ 303.889899] ? check_same_owner+0x320/0x320 [ 303.894200] ? lock_downgrade+0x8e0/0x8e0 [ 303.898331] ? rcu_note_context_switch+0x710/0x710 [ 303.903250] __should_failslab+0x124/0x180 [ 303.907472] should_failslab+0x9/0x14 [ 303.911259] kmem_cache_alloc_trace+0x2cb/0x780 [ 303.915915] ? __might_sleep+0x95/0x190 [ 303.919885] ? device_create_file+0x1e0/0x1e0 [ 303.924365] kobject_uevent_env+0x20f/0xea0 [ 303.928668] ? graph_lock+0x170/0x170 [ 303.932457] kobject_uevent+0x1f/0x30 [ 303.936246] figure_loop_size+0x29a/0x330 [ 303.940382] lo_ioctl+0xd04/0x1ec0 [ 303.943903] ? graph_lock+0x170/0x170 [ 303.947688] ? loop_clr_fd+0xb80/0xb80 [ 303.951562] blkdev_ioctl+0x9b6/0x2020 [ 303.955434] ? blkpg_ioctl+0xc40/0xc40 [ 303.959311] ? lock_downgrade+0x8e0/0x8e0 [ 303.963457] ? kasan_check_read+0x11/0x20 [ 303.967588] ? rcu_is_watching+0x85/0x140 [ 303.971724] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 303.976905] ? __fget+0x40c/0x650 [ 303.980343] ? match_held_lock+0x811/0x8b0 [ 303.984562] ? expand_files.part.8+0x9a0/0x9a0 [ 303.989127] ? kasan_check_write+0x14/0x20 [ 303.993348] ? __mutex_unlock_slowpath+0x180/0x8a0 [ 303.998261] block_ioctl+0xee/0x130 [ 304.001870] ? blkdev_fallocate+0x400/0x400 [ 304.006175] do_vfs_ioctl+0x1cf/0x1650 [ 304.010048] ? ioctl_preallocate+0x2e0/0x2e0 [ 304.014437] ? fget_raw+0x20/0x20 [ 304.017875] ? __sb_end_write+0xac/0xe0 [ 304.021838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.027354] ? fput+0x130/0x1a0 [ 304.030621] ? ksys_write+0x1a6/0x250 [ 304.034408] ? security_file_ioctl+0x94/0xc0 [ 304.038799] ksys_ioctl+0xa9/0xd0 [ 304.042235] SyS_ioctl+0x24/0x30 [ 304.045583] ? ksys_ioctl+0xd0/0xd0 [ 304.049194] do_syscall_64+0x29e/0x9d0 [ 304.053062] ? vmalloc_sync_all+0x30/0x30 [ 304.057455] ? _raw_spin_unlock_irq+0x27/0x70 [ 304.061936] ? finish_task_switch+0x1ca/0x810 [ 304.066416] ? syscall_return_slowpath+0x5c0/0x5c0 [ 304.071329] ? syscall_return_slowpath+0x30f/0x5c0 [ 304.076243] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 304.081591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.086416] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 304.091583] RIP: 0033:0x455319 [ 304.094752] RSP: 002b:00007f0b2d9abc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.102443] RAX: ffffffffffffffda RBX: 00007f0b2d9ac6d4 RCX: 0000000000455319 [ 304.109693] RDX: 0000000000000000 RSI: 0000000000004c07 RDI: 0000000000000014 [ 304.116946] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 304.124195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 304.131452] R13: 0000000000000283 R14: 00000000006f6ce8 R15: 0000000000000000 2018/04/13 09:12:48 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$fiemap(r0, 0xc020660b, &(0x7f00000001c0)={0x6, 0x4, 0x4, 0x6, 0x8, [{0x800, 0x4, 0x0, 0x0, 0x0, 0x9}, {0x5, 0xffffffff00000000, 0x9, 0x0, 0x0, 0x400}, {0x0, 0x10001, 0x7}, {0x23f, 0x0, 0x2, 0x0, 0x0, 0x10d}, {0x4, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x80}, {0x1, 0x5, 0x80, 0x0, 0x0, 0x1}, {0x3, 0x0, 0x400, 0x0, 0x0, 0x1080}, {0xe04, 0x16d, 0x2, 0x0, 0x0, 0x900}]}) 2018/04/13 09:12:48 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240400000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:48 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x29], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:48 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 2018/04/13 09:12:48 executing program 5 (fault-call:8 fault-nth:1): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:48 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:48 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40086602, &(0x7f00000001c0)=ANY=[@ANYBLOB="020001000000000000000000ff000000000000000000000000000000f0000000"]) 2018/04/13 09:12:48 executing program 0 (fault-call:4 fault-nth:1): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:48 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240600000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) [ 304.406612] FAULT_INJECTION: forcing a failure. [ 304.406612] name failslab, interval 1, probability 0, space 0, times 0 [ 304.417933] CPU: 1 PID: 20500 Comm: syz-executor5 Not tainted 4.16.0+ #2 [ 304.424778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.434135] Call Trace: [ 304.436731] dump_stack+0x1b9/0x294 [ 304.440368] ? dump_stack_print_info.cold.2+0x52/0x52 [ 304.445569] ? __save_stack_trace+0x7e/0xd0 [ 304.449898] should_fail.cold.4+0xa/0x1a [ 304.453976] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 304.459081] ? save_stack+0x43/0xd0 [ 304.462712] ? kasan_kmalloc+0xc4/0xe0 [ 304.466602] ? kmem_cache_alloc_trace+0x152/0x780 [ 304.471453] ? alloc_pipe_info+0x16d/0x580 [ 304.475690] ? splice_direct_to_actor+0x6e7/0x8d0 [ 304.480533] ? do_sendfile+0x60f/0xe00 [ 304.484423] ? SyS_sendfile64+0xdf/0x190 [ 304.488491] ? do_syscall_64+0x29e/0x9d0 [ 304.492562] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 304.497925] ? find_held_lock+0x36/0x1c0 [ 304.501981] ? check_same_owner+0x320/0x320 [ 304.506288] ? rcu_is_watching+0x85/0x140 [ 304.510421] ? rcu_note_context_switch+0x710/0x710 [ 304.515337] __should_failslab+0x124/0x180 [ 304.519553] should_failslab+0x9/0x14 [ 304.523337] __kmalloc+0x2c8/0x760 [ 304.526859] ? kmem_cache_alloc_trace+0x616/0x780 [ 304.531689] ? alloc_pipe_info+0x2a0/0x580 [ 304.535913] alloc_pipe_info+0x2a0/0x580 [ 304.539959] ? pipe_read+0x940/0x940 [ 304.543654] ? __fget+0x40c/0x650 [ 304.547097] ? expand_files.part.8+0x9a0/0x9a0 [ 304.551659] ? find_held_lock+0x36/0x1c0 [ 304.555710] splice_direct_to_actor+0x6e7/0x8d0 [ 304.560369] ? pipe_to_sendpage+0x3f0/0x3f0 [ 304.564675] ? lock_downgrade+0x8e0/0x8e0 [ 304.568809] ? do_splice_to+0x190/0x190 [ 304.572768] ? rw_verify_area+0x118/0x360 [ 304.576904] do_splice_direct+0x2cc/0x400 [ 304.581039] ? splice_direct_to_actor+0x8d0/0x8d0 [ 304.585866] ? rw_verify_area+0x118/0x360 [ 304.590000] do_sendfile+0x60f/0xe00 [ 304.593707] ? do_compat_pwritev64+0x1b0/0x1b0 [ 304.598273] ? __might_sleep+0x95/0x190 [ 304.602235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.607754] ? _copy_from_user+0xdf/0x150 [ 304.611883] SyS_sendfile64+0xdf/0x190 [ 304.615758] ? SyS_sendfile+0x1d0/0x1d0 [ 304.619719] ? do_syscall_64+0xb7/0x9d0 [ 304.623676] ? SyS_sendfile+0x1d0/0x1d0 [ 304.627640] do_syscall_64+0x29e/0x9d0 [ 304.631509] ? vmalloc_sync_all+0x30/0x30 [ 304.635636] ? _raw_spin_unlock_irq+0x27/0x70 [ 304.640112] ? finish_task_switch+0x1ca/0x810 [ 304.644592] ? syscall_return_slowpath+0x5c0/0x5c0 [ 304.649502] ? syscall_return_slowpath+0x30f/0x5c0 [ 304.654416] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 304.659764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.664593] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 304.669762] RIP: 0033:0x455319 [ 304.672932] RSP: 002b:00007f78fd9d8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 304.680621] RAX: ffffffffffffffda RBX: 00007f78fd9d96d4 RCX: 0000000000455319 [ 304.687871] RDX: 0000000020d83ff8 RSI: 0000000000000016 RDI: 0000000000000015 [ 304.695124] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/13 09:12:48 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80042, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000040)={0x8, 0x8, [{0x0, 0x0, 0x80000000}, {0x10000, 0x0, 0x90a}, {0x81, 0x0, 0x7}, {0xd53, 0x0, 0x6}, {0x4, 0x0, 0x4}, {0x80000000, 0x0, 0x8}, {0x5, 0x0, 0x5}, {0x2, 0x0, 0x6}]}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c81) 2018/04/13 09:12:48 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 2018/04/13 09:12:48 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x6c], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:48 executing program 2 (fault-call:9 fault-nth:0): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 304.702373] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000017 [ 304.709623] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000001 2018/04/13 09:12:48 executing program 5 (fault-call:8 fault-nth:2): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 304.958739] FAULT_INJECTION: forcing a failure. [ 304.958739] name failslab, interval 1, probability 0, space 0, times 0 [ 304.969174] FAULT_INJECTION: forcing a failure. [ 304.969174] name failslab, interval 1, probability 0, space 0, times 0 [ 304.970063] CPU: 0 PID: 20537 Comm: syz-executor5 Not tainted 4.16.0+ #2 [ 304.988148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.997494] Call Trace: [ 305.000085] dump_stack+0x1b9/0x294 [ 305.003710] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.008899] should_fail.cold.4+0xa/0x1a [ 305.012955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 305.018053] ? lock_downgrade+0x8e0/0x8e0 [ 305.022196] ? kasan_check_read+0x11/0x20 [ 305.026338] ? rcu_is_watching+0x85/0x140 [ 305.030477] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 305.035662] ? find_get_entry+0x2e7/0xb90 [ 305.039807] ? filemap_map_pages+0x1870/0x1870 [ 305.044394] __should_failslab+0x124/0x180 [ 305.048621] should_failslab+0x9/0x14 [ 305.052409] kmem_cache_alloc+0x47/0x760 [ 305.056463] ? rcu_note_context_switch+0x710/0x710 [ 305.061391] ? mempool_free+0x370/0x370 [ 305.065373] mempool_alloc_slab+0x44/0x60 [ 305.069522] mempool_alloc+0x18b/0x490 [ 305.073407] ? remove_element.isra.4+0x1c0/0x1c0 [ 305.078153] ? check_noncircular+0x20/0x20 [ 305.082388] ? __lock_acquire+0x7f5/0x5130 [ 305.086611] ? __lock_acquire+0x7f5/0x5130 [ 305.090838] ? unwind_get_return_address+0x61/0xa0 [ 305.095763] bio_alloc_bioset+0x3a1/0x7f0 [ 305.099906] ? bvec_alloc+0x2d0/0x2d0 [ 305.103696] ? check_same_owner+0x320/0x320 [ 305.108013] submit_bh_wbc+0x155/0x7c0 [ 305.111895] block_read_full_page+0x939/0xab0 [ 305.116387] ? check_disk_change+0x140/0x140 [ 305.120787] ? __bread_gfp+0x310/0x310 [ 305.124670] ? check_same_owner+0x320/0x320 [ 305.128987] blkdev_readpage+0x1c/0x20 [ 305.132864] generic_file_read_iter+0x14b6/0x2e90 [ 305.137697] ? __lock_acquire+0x7f5/0x5130 [ 305.141929] ? filemap_range_has_page+0x3c0/0x3c0 [ 305.146761] ? print_usage_bug+0xc0/0xc0 [ 305.150810] ? __lock_acquire+0x7f5/0x5130 [ 305.155033] ? __lock_acquire+0x7f5/0x5130 [ 305.159259] ? debug_check_no_locks_freed+0x310/0x310 [ 305.164438] ? print_usage_bug+0xc0/0xc0 [ 305.168584] ? print_usage_bug+0xc0/0xc0 [ 305.172641] ? print_usage_bug+0xc0/0xc0 [ 305.176691] ? __lock_acquire+0x7f5/0x5130 [ 305.180912] ? __lock_acquire+0x7f5/0x5130 [ 305.185140] ? graph_lock+0x170/0x170 [ 305.188935] ? __lock_acquire+0x7f5/0x5130 [ 305.193164] ? find_held_lock+0x36/0x1c0 [ 305.197225] ? lock_downgrade+0x8e0/0x8e0 [ 305.201369] ? kasan_check_read+0x11/0x20 [ 305.205507] ? rcu_is_watching+0x85/0x140 [ 305.209647] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 305.214834] ? is_bpf_text_address+0xd7/0x170 [ 305.219320] ? kernel_text_address+0x79/0xf0 [ 305.223722] ? __unwind_start+0x166/0x330 [ 305.227867] ? __kernel_text_address+0xd/0x40 [ 305.233128] ? unwind_get_return_address+0x61/0xa0 [ 305.238066] ? __save_stack_trace+0x7e/0xd0 [ 305.242390] ? save_stack+0xa9/0xd0 [ 305.246006] ? save_stack+0x43/0xd0 [ 305.249620] ? kasan_kmalloc+0xc4/0xe0 [ 305.253494] ? __kmalloc+0x14e/0x760 [ 305.257197] ? alloc_pipe_info+0x2a0/0x580 [ 305.261681] ? splice_direct_to_actor+0x6e7/0x8d0 [ 305.266523] ? do_splice_direct+0x2cc/0x400 [ 305.270832] ? do_sendfile+0x60f/0xe00 [ 305.274708] ? SyS_sendfile64+0xdf/0x190 [ 305.278757] ? do_syscall_64+0x29e/0x9d0 [ 305.282809] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 305.288166] ? lock_downgrade+0x8e0/0x8e0 [ 305.292309] ? kasan_check_read+0x11/0x20 [ 305.296449] ? debug_mutex_init+0x1c/0x60 [ 305.300586] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 305.305593] ? __lockdep_init_map+0x105/0x590 [ 305.310077] ? lockdep_init_map+0x9/0x10 [ 305.314128] ? debug_mutex_init+0x2d/0x60 [ 305.318267] ? __mutex_init+0x1ef/0x280 [ 305.322235] ? SyS_membarrier+0x7f0/0x7f0 [ 305.326382] ? __lockdep_init_map+0x105/0x590 [ 305.330877] blkdev_read_iter+0x120/0x190 [ 305.335025] generic_file_splice_read+0x4bd/0x820 [ 305.339865] ? pipe_to_user+0x170/0x170 [ 305.343842] ? rw_verify_area+0x118/0x360 [ 305.347980] ? pipe_to_user+0x170/0x170 [ 305.351945] do_splice_to+0x12e/0x190 [ 305.355736] splice_direct_to_actor+0x268/0x8d0 [ 305.360394] ? pipe_to_sendpage+0x3f0/0x3f0 [ 305.364711] ? do_splice_to+0x190/0x190 [ 305.368675] ? rw_verify_area+0x118/0x360 [ 305.372822] do_splice_direct+0x2cc/0x400 [ 305.376960] ? splice_direct_to_actor+0x8d0/0x8d0 [ 305.381798] ? rw_verify_area+0x118/0x360 [ 305.385938] do_sendfile+0x60f/0xe00 [ 305.389648] ? do_compat_pwritev64+0x1b0/0x1b0 [ 305.394220] ? __might_sleep+0x95/0x190 [ 305.398193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.403721] ? _copy_from_user+0xdf/0x150 [ 305.407859] SyS_sendfile64+0xdf/0x190 [ 305.411735] ? SyS_sendfile+0x1d0/0x1d0 [ 305.415700] ? do_syscall_64+0xb7/0x9d0 [ 305.419665] ? SyS_sendfile+0x1d0/0x1d0 [ 305.423628] do_syscall_64+0x29e/0x9d0 [ 305.427503] ? vmalloc_sync_all+0x30/0x30 [ 305.431640] ? _raw_spin_unlock_irq+0x27/0x70 [ 305.436127] ? finish_task_switch+0x1ca/0x810 [ 305.440613] ? syscall_return_slowpath+0x5c0/0x5c0 [ 305.445533] ? syscall_return_slowpath+0x30f/0x5c0 [ 305.450455] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 305.455810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.460646] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 305.465821] RIP: 0033:0x455319 [ 305.468996] RSP: 002b:00007f78fd9d8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 305.476696] RAX: ffffffffffffffda RBX: 00007f78fd9d96d4 RCX: 0000000000455319 [ 305.483950] RDX: 0000000020d83ff8 RSI: 0000000000000016 RDI: 0000000000000015 [ 305.491209] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 305.498469] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000017 [ 305.505728] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000002 [ 305.513007] CPU: 1 PID: 20545 Comm: syz-executor2 Not tainted 4.16.0+ #2 [ 305.519854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.529208] Call Trace: [ 305.531807] dump_stack+0x1b9/0x294 [ 305.535448] ? dump_stack_print_info.cold.2+0x52/0x52 [ 305.540639] ? debug_check_no_locks_freed+0x310/0x310 [ 305.545843] ? debug_check_no_locks_freed+0x310/0x310 [ 305.551043] should_fail.cold.4+0xa/0x1a [ 305.555115] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/13 09:12:49 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x600000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e23, 0x345e, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x80000000}, {0xa, 0x4e20, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x9e1}, 0xf000000000000000, [0x1, 0x10000, 0x8000, 0x4, 0x5, 0x20, 0x0, 0x9]}, 0x5c) [ 305.560236] ? debug_check_no_locks_freed+0x310/0x310 [ 305.565442] ? find_held_lock+0x36/0x1c0 [ 305.569531] ? check_same_owner+0x320/0x320 [ 305.573864] ? rcu_note_context_switch+0x710/0x710 [ 305.578806] __should_failslab+0x124/0x180 [ 305.583051] should_failslab+0x9/0x14 [ 305.586859] kmem_cache_alloc_trace+0x2cb/0x780 [ 305.591538] ? kasan_check_read+0x11/0x20 [ 305.595696] alloc_pipe_info+0x16d/0x580 [ 305.599764] ? pipe_read+0x940/0x940 [ 305.603485] ? __fget+0x40c/0x650 [ 305.606942] ? expand_files.part.8+0x9a0/0x9a0 2018/04/13 09:12:49 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 305.611526] ? find_held_lock+0x36/0x1c0 [ 305.615595] splice_direct_to_actor+0x6e7/0x8d0 [ 305.620271] ? pipe_to_sendpage+0x3f0/0x3f0 [ 305.624593] ? lock_downgrade+0x8e0/0x8e0 [ 305.628778] ? do_splice_to+0x190/0x190 [ 305.632759] ? rw_verify_area+0x118/0x360 [ 305.636916] do_splice_direct+0x2cc/0x400 [ 305.641073] ? splice_direct_to_actor+0x8d0/0x8d0 [ 305.645930] ? rw_verify_area+0x118/0x360 [ 305.650089] do_sendfile+0x60f/0xe00 [ 305.653822] ? do_compat_pwritev64+0x1b0/0x1b0 [ 305.658408] ? __might_sleep+0x95/0x190 [ 305.662394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.667938] ? _copy_from_user+0xdf/0x150 [ 305.672091] SyS_sendfile64+0xdf/0x190 [ 305.675986] ? SyS_sendfile+0x1d0/0x1d0 [ 305.679971] ? do_syscall_64+0xb7/0x9d0 [ 305.683948] ? SyS_sendfile+0x1d0/0x1d0 [ 305.687930] do_syscall_64+0x29e/0x9d0 [ 305.691830] ? vmalloc_sync_all+0x30/0x30 [ 305.695981] ? _raw_spin_unlock_irq+0x27/0x70 [ 305.700480] ? finish_task_switch+0x1ca/0x810 [ 305.704985] ? syscall_return_slowpath+0x5c0/0x5c0 [ 305.709918] ? syscall_return_slowpath+0x30f/0x5c0 [ 305.714855] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 305.720236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.725091] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 305.730280] RIP: 0033:0x455319 [ 305.733464] RSP: 002b:00007f6809781c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 305.741174] RAX: ffffffffffffffda RBX: 00007f68097826d4 RCX: 0000000000455319 [ 305.748443] RDX: 0000000020d83ff8 RSI: 0000000000000016 RDI: 0000000000000015 [ 305.755714] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 305.762982] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000017 [ 305.770257] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000000 2018/04/13 09:12:49 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="24060f000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:49 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x3000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) 2018/04/13 09:12:49 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x1268) 2018/04/13 09:12:50 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x1268) 2018/04/13 09:12:50 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="2475b6aa1f04f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:50 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2100], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) fcntl$getown(r0, 0x9) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) open(&(0x7f0000000000)='./file0\x00', 0x180, 0x100) 2018/04/13 09:12:50 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x80081270) 2018/04/13 09:12:50 executing program 5 (fault-call:8 fault-nth:3): open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:50 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:50 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:50 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2c00000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:50 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c000000020000001143933f"], 0x100) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10a00) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 2018/04/13 09:12:50 executing program 7: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) write$vnet(r0, &(0x7f00000001c0)={0x1, {&(0x7f00000006c0)=""/4096, 0x1000, &(0x7f0000000180)=""/7}}, 0x68) [ 306.897985] FAULT_INJECTION: forcing a failure. [ 306.897985] name failslab, interval 1, probability 0, space 0, times 0 [ 306.909289] CPU: 1 PID: 20661 Comm: syz-executor5 Not tainted 4.16.0+ #2 [ 306.916130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.925484] Call Trace: [ 306.928073] dump_stack+0x1b9/0x294 [ 306.931738] ? dump_stack_print_info.cold.2+0x52/0x52 [ 306.936927] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 306.941942] ? radix_tree_extend+0x534/0x640 [ 306.946353] should_fail.cold.4+0xa/0x1a [ 306.950415] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 306.955540] ? idr_destroy+0x1b0/0x1b0 [ 306.959430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.964961] ? replace_slot+0x14b/0x4f0 [ 306.968937] ? workingset_update_node+0x18b/0x280 [ 306.973780] ? mem_cgroup_count_precharge_pte_range+0x740/0x740 [ 306.979846] ? graph_lock+0x170/0x170 [ 306.983655] ? __mem_cgroup_threshold+0x720/0x720 [ 306.988504] ? graph_lock+0x170/0x170 [ 306.992303] ? print_usage_bug+0xc0/0xc0 [ 306.996368] ? do_raw_spin_unlock+0x9e/0x2e0 [ 307.000785] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 307.005801] ? ieee80211_do_open+0x5e0/0x2500 [ 307.010302] __should_failslab+0x124/0x180 [ 307.014534] should_failslab+0x9/0x14 [ 307.018328] kmem_cache_alloc+0x47/0x760 [ 307.022385] ? rcu_note_context_switch+0x710/0x710 [ 307.027310] ? kasan_check_read+0x11/0x20 [ 307.031457] ? mempool_free+0x370/0x370 [ 307.035428] mempool_alloc_slab+0x44/0x60 [ 307.039585] mempool_alloc+0x18b/0x490 [ 307.043513] ? remove_element.isra.4+0x1c0/0x1c0 [ 307.048288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.053830] ? __lru_cache_add+0x31c/0x440 [ 307.058074] ? __pagevec_lru_add+0x30/0x30 [ 307.062317] bio_alloc_bioset+0x3a1/0x7f0 [ 307.067162] ? bvec_alloc+0x2d0/0x2d0 [ 307.070968] ? debug_check_no_locks_freed+0x310/0x310 [ 307.076172] mpage_alloc.isra.7+0x62/0x2d0 [ 307.080407] do_mpage_readpage+0x139e/0x1d10 [ 307.084825] ? mpage_writepage+0x2b0/0x2b0 [ 307.089058] ? add_to_page_cache_lru+0x29b/0x5c0 [ 307.093816] ? add_to_page_cache_locked+0x40/0x40 [ 307.098661] ? find_held_lock+0x36/0x1c0 [ 307.102740] ? rcu_pm_notify+0xc0/0xc0 [ 307.106633] mpage_readpages+0x578/0x970 [ 307.110694] ? check_disk_change+0x140/0x140 [ 307.115110] ? check_disk_change+0x140/0x140 [ 307.119525] ? do_mpage_readpage+0x1d10/0x1d10 [ 307.124112] ? graph_lock+0x170/0x170 [ 307.127908] ? lock_repin_lock+0x410/0x410 [ 307.132146] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 307.137163] ? __radix_tree_lookup+0x3d5/0x6c0 [ 307.141755] ? __schedule+0x809/0x1e30 [ 307.145656] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 307.151198] ? blk_start_plug+0xc4/0x360 [ 307.155258] ? blk_lld_busy+0x70/0x70 [ 307.159064] ? rcu_is_watching+0x85/0x140 [ 307.163216] ? __filemap_set_wb_err+0x3a0/0x3a0 [ 307.167889] blkdev_readpages+0x2c/0x40 [ 307.171868] ? blkdev_write_begin+0x50/0x50 [ 307.176287] __do_page_cache_readahead+0x79a/0xdc0 [ 307.181235] ? read_cache_pages+0x990/0x990 [ 307.185565] ? activate_page+0x980/0x980 [ 307.189636] ? __radix_tree_insert+0x8d0/0x8d0 [ 307.194309] ? find_get_pages_contig+0x1560/0x1560 [ 307.199240] ? find_held_lock+0x36/0x1c0 [ 307.203306] ? lock_downgrade+0x8e0/0x8e0 [ 307.207458] ? kasan_check_read+0x11/0x20 [ 307.211612] ? radix_tree_lookup+0x21/0x30 [ 307.215857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.221396] ondemand_readahead+0x550/0xc40 [ 307.226509] ? ondemand_readahead+0x550/0xc40 [ 307.231011] page_cache_sync_readahead+0xd1/0x110 [ 307.235870] generic_file_read_iter+0x1b5d/0x2e90 [ 307.240735] ? filemap_range_has_page+0x3c0/0x3c0 [ 307.245573] ? print_usage_bug+0xc0/0xc0 [ 307.249627] ? __lock_acquire+0x7f5/0x5130 [ 307.253855] ? __lock_acquire+0x7f5/0x5130 [ 307.258091] ? debug_check_no_locks_freed+0x310/0x310 [ 307.263275] ? print_usage_bug+0xc0/0xc0 [ 307.267332] ? print_usage_bug+0xc0/0xc0 [ 307.271396] ? print_usage_bug+0xc0/0xc0 [ 307.275455] ? __lock_acquire+0x7f5/0x5130 [ 307.279687] ? __lock_acquire+0x7f5/0x5130 [ 307.283928] ? graph_lock+0x170/0x170 [ 307.287729] ? __lock_acquire+0x7f5/0x5130 [ 307.291963] ? find_held_lock+0x36/0x1c0 [ 307.296035] ? lock_downgrade+0x8e0/0x8e0 [ 307.300194] ? kasan_check_read+0x11/0x20 [ 307.304348] ? rcu_is_watching+0x85/0x140 [ 307.308504] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 307.313707] ? is_bpf_text_address+0xd7/0x170 [ 307.318198] ? kernel_text_address+0x79/0xf0 [ 307.322610] ? __unwind_start+0x166/0x330 [ 307.326757] ? __kernel_text_address+0xd/0x40 [ 307.331250] ? unwind_get_return_address+0x61/0xa0 [ 307.336177] ? __save_stack_trace+0x7e/0xd0 [ 307.340508] ? save_stack+0xa9/0xd0 [ 307.344130] ? save_stack+0x43/0xd0 [ 307.347752] ? kasan_kmalloc+0xc4/0xe0 [ 307.351630] ? __kmalloc+0x14e/0x760 [ 307.355339] ? alloc_pipe_info+0x2a0/0x580 [ 307.359572] ? splice_direct_to_actor+0x6e7/0x8d0 [ 307.364404] ? do_splice_direct+0x2cc/0x400 [ 307.368709] ? SyS_sendfile64+0xdf/0x190 [ 307.372751] ? do_syscall_64+0x29e/0x9d0 [ 307.376793] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 307.382138] ? lock_downgrade+0x8e0/0x8e0 [ 307.386270] ? kasan_check_read+0x11/0x20 [ 307.390399] ? debug_mutex_init+0x1c/0x60 [ 307.394527] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 307.399522] ? __lockdep_init_map+0x105/0x590 [ 307.404000] ? lockdep_init_map+0x9/0x10 [ 307.408055] ? debug_mutex_init+0x2d/0x60 [ 307.412184] ? __mutex_init+0x1ef/0x280 [ 307.416145] ? SyS_membarrier+0x7f0/0x7f0 [ 307.420270] ? __lockdep_init_map+0x105/0x590 [ 307.424757] blkdev_read_iter+0x120/0x190 [ 307.428893] generic_file_splice_read+0x4bd/0x820 [ 307.433728] ? pipe_to_user+0x170/0x170 [ 307.437696] ? rw_verify_area+0x118/0x360 [ 307.441824] ? pipe_to_user+0x170/0x170 [ 307.445777] do_splice_to+0x12e/0x190 [ 307.449569] splice_direct_to_actor+0x268/0x8d0 [ 307.454227] ? pipe_to_sendpage+0x3f0/0x3f0 [ 307.458527] ? do_splice_to+0x190/0x190 [ 307.462484] ? rw_verify_area+0x118/0x360 [ 307.466613] do_splice_direct+0x2cc/0x400 [ 307.470744] ? splice_direct_to_actor+0x8d0/0x8d0 [ 307.475572] ? rw_verify_area+0x118/0x360 [ 307.479703] do_sendfile+0x60f/0xe00 [ 307.483412] ? do_compat_pwritev64+0x1b0/0x1b0 [ 307.487975] ? __might_sleep+0x95/0x190 [ 307.491940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.497459] ? _copy_from_user+0xdf/0x150 [ 307.501589] SyS_sendfile64+0xdf/0x190 [ 307.505458] ? SyS_sendfile+0x1d0/0x1d0 [ 307.509414] ? do_syscall_64+0xb7/0x9d0 [ 307.513366] ? SyS_sendfile+0x1d0/0x1d0 [ 307.517319] do_syscall_64+0x29e/0x9d0 [ 307.521187] ? vmalloc_sync_all+0x30/0x30 [ 307.525315] ? _raw_spin_unlock_irq+0x27/0x70 [ 307.529785] ? finish_task_switch+0x1ca/0x810 [ 307.534262] ? syscall_return_slowpath+0x5c0/0x5c0 [ 307.539169] ? syscall_return_slowpath+0x30f/0x5c0 [ 307.544078] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 307.549421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.554244] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 307.559411] RIP: 0033:0x455319 [ 307.562577] RSP: 002b:00007f78fd9d8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 307.570263] RAX: ffffffffffffffda RBX: 00007f78fd9d96d4 RCX: 0000000000455319 [ 307.577509] RDX: 0000000020d83ff8 RSI: 0000000000000016 RDI: 0000000000000015 [ 307.584755] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 307.592004] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000017 2018/04/13 09:12:51 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="246c00000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:51 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c05) 2018/04/13 09:12:51 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:51 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x2900000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000000c0)={0x3, 0x8}) set_tid_address(&(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) 2018/04/13 09:12:51 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x80081270) 2018/04/13 09:12:51 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/04/13 09:12:51 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8)=0x8000000000000000, 0x8000fffffffe) [ 307.599261] R13: 00000000000004c6 R14: 00000000006fa330 R15: 0000000000000003 2018/04/13 09:12:51 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="240300000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:51 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c81) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x40001) memfd_create(&(0x7f0000000100)='vmnet1eth1vmnet1-\x00', 0x3) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0xfa2}, 0x8) 2018/04/13 09:12:51 executing program 4: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "", [[]]}, 0x158) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 307.698630] [ 307.700292] ================================================ [ 307.706079] WARNING: lock held when returning to user space! [ 307.711875] 4.16.0+ #2 Not tainted [ 307.715412] ------------------------------------------------ [ 307.721200] syz-executor0/20697 is leaving the kernel with locks still held! [ 307.728384] 1 lock held by syz-executor0/20697: [ 307.733041] #0: 00000000fdc832f3 (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8d/0x1ec0 2018/04/13 09:12:51 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x21000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:51 executing program 2: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8)=0x6000000, 0x8000fffffffe) 2018/04/13 09:12:51 executing program 7: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000140), 0x0, 0x55c3}], 0x0, &(0x7f0000000780)=ANY=[]) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = dup(r0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19a, 0x38, 0x183, 0xc344, 0x5, 0x20}, [{0x0, 0x2, 0x0, 0x0, 0x5, 0x3f, 0xad81, 0x2}], "c48cc88f422660276b8ab3e7773c582dd5fb63c0de8c54a0b52bf5aec9b264a627987be6d149cc48dc9ec96f87c5caf51bed305e3ad0631f0edc3f107efd245f761a016fba92de45abed41359b59cedf7ef8f7eefb3be890631e143a770e819fdb5696fbd021cd22bc9e3854e2584b85d530de7faa4076fe71e95564077a974ed3e2dc4236604082369d1867a0752fbecc519eeac91ac37058610c"}, 0xf3) sendfile(r1, r2, &(0x7f0000d83ff8)=0x8000000000000000, 0x8000fffffffe) 2018/04/13 09:12:51 executing program 6: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000f18000)={0x0, 0x0, &(0x7f000076dff0)=[{&(0x7f0000c21f67)="247400000104f50000f90000000008000a20faff0900010004e800603300000001ab001f", 0x24}], 0x1}, 0x0) 2018/04/13 09:12:51 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x84ffffff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 2018/04/13 09:12:51 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000007000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty=[0x0, 0x1000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @multicast1=0xe0000001}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 308.808208] ================================================================== [ 308.815611] BUG: KASAN: use-after-free in __mutex_lock+0x175f/0x17f0 [ 308.822085] Read of size 4 at addr ffff8801ad554578 by task syz-executor0/4533 [ 308.829415] [ 308.831027] CPU: 1 PID: 4533 Comm: syz-executor0 Not tainted 4.16.0+ #2 [ 308.837752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.847079] Call Trace: [ 308.849648] dump_stack+0x1b9/0x294 [ 308.853260] ? dump_stack_print_info.cold.2+0x52/0x52 [ 308.858427] ? printk+0x9e/0xba [ 308.861687] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 308.866422] ? kasan_check_write+0x14/0x20 [ 308.870636] print_address_description+0x6c/0x20b [ 308.875458] ? __mutex_lock+0x175f/0x17f0 [ 308.879588] kasan_report.cold.7+0xac/0x2f5 [ 308.883900] __asan_report_load4_noabort+0x14/0x20 [ 308.888809] __mutex_lock+0x175f/0x17f0 [ 308.892762] ? debug_check_no_locks_freed+0x310/0x310 [ 308.897933] ? lo_ioctl+0x8d/0x1ec0 [ 308.901541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.907062] ? __d_lookup_rcu+0x54e/0xa80 [ 308.911191] ? mutex_trylock+0x2a0/0x2a0 [ 308.915230] ? lock_acquire+0x1dc/0x520 [ 308.919184] ? mntput_no_expire+0x158/0xba0 [ 308.923485] ? lock_downgrade+0x8e0/0x8e0 [ 308.927611] ? lockref_put_or_lock+0x6f/0x90 [ 308.931996] ? lock_release+0xa10/0xa10 [ 308.935953] ? dput.part.27+0x214/0x7b0 [ 308.939908] ? lock_downgrade+0x8e0/0x8e0 [ 308.944035] ? kasan_check_read+0x11/0x20 [ 308.948163] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 308.952726] ? mntput_no_expire+0x186/0xba0 [ 308.957026] ? _raw_spin_unlock+0x22/0x30 [ 308.961154] ? mnt_get_count+0x150/0x150 [ 308.965196] ? dput.part.27+0x242/0x7b0 [ 308.969149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.974665] ? bpf_prog_kallsyms_find+0xd6/0x4a0 [ 308.979399] ? lock_acquire+0x1dc/0x520 [ 308.983356] ? is_bpf_text_address+0xae/0x170 [ 308.987831] ? lock_downgrade+0x8e0/0x8e0 [ 308.991957] ? lock_release+0xa10/0xa10 [ 308.995913] ? kasan_check_read+0x11/0x20 [ 309.000042] ? rcu_is_watching+0x85/0x140 [ 309.004171] mutex_lock_killable_nested+0x16/0x20 [ 309.008992] ? mutex_lock_killable_nested+0x16/0x20 [ 309.013992] lo_ioctl+0x8d/0x1ec0 [ 309.017428] ? is_bpf_text_address+0xd7/0x170 [ 309.021905] ? kernel_text_address+0x79/0xf0 [ 309.026294] ? loop_clr_fd+0xb80/0xb80 [ 309.030160] blkdev_ioctl+0x9b6/0x2020 [ 309.034027] ? __save_stack_trace+0x7e/0xd0 [ 309.038327] ? blkpg_ioctl+0xc40/0xc40 [ 309.042196] ? save_stack+0xa9/0xd0 [ 309.045801] ? save_stack+0x43/0xd0 [ 309.049406] ? __kasan_slab_free+0x11a/0x170 [ 309.053792] ? kasan_slab_free+0xe/0x10 [ 309.057742] ? kmem_cache_free+0x86/0x2d0 [ 309.061869] ? putname+0xf2/0x130 [ 309.066385] ? do_sys_open+0x57f/0x770 [ 309.070254] ? SyS_open+0x2d/0x40 [ 309.073685] ? do_syscall_64+0x29e/0x9d0 [ 309.077725] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.083068] ? kasan_check_read+0x11/0x20 [ 309.087194] ? do_raw_spin_unlock+0x9e/0x2e0 [ 309.091582] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 309.096144] ? kasan_check_write+0x14/0x20 [ 309.100355] ? do_raw_spin_lock+0xc1/0x200 [ 309.104572] ? trace_hardirqs_off+0xd/0x10 [ 309.108787] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 309.113870] block_ioctl+0xee/0x130 [ 309.117475] ? blkdev_fallocate+0x400/0x400 [ 309.121776] do_vfs_ioctl+0x1cf/0x1650 [ 309.125642] ? ioctl_preallocate+0x2e0/0x2e0 [ 309.130028] ? fget_raw+0x20/0x20 [ 309.133462] ? trace_hardirqs_on+0xd/0x10 [ 309.137584] ? kmem_cache_free+0x22e/0x2d0 [ 309.141800] ? putname+0xf7/0x130 [ 309.145234] ? security_file_ioctl+0x94/0xc0 [ 309.149619] ksys_ioctl+0xa9/0xd0 [ 309.153053] SyS_ioctl+0x24/0x30 [ 309.156399] ? ksys_ioctl+0xd0/0xd0 [ 309.160010] do_syscall_64+0x29e/0x9d0 [ 309.163879] ? vmalloc_sync_all+0x30/0x30 [ 309.168010] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 309.172831] ? syscall_return_slowpath+0x5c0/0x5c0 [ 309.177747] ? syscall_return_slowpath+0x30f/0x5c0 [ 309.182656] ? prepare_exit_to_usermode+0x285/0x390 [ 309.187649] ? perf_trace_sys_enter+0xaf0/0xaf0 [ 309.192296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.197121] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.202289] RIP: 0033:0x455187 [ 309.205454] RSP: 002b:0000000000a3eab8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.213140] RAX: ffffffffffffffda RBX: 00000000000000f6 RCX: 0000000000455187 [ 309.220387] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000013 [ 309.227632] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 309.234885] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000013 [ 309.242133] R13: 0000000000000000 R14: 00000000006fe800 R15: 0000000000001380 [ 309.249383] [ 309.250992] Allocated by task 20687: [ 309.254688] save_stack+0x43/0xd0 [ 309.258120] kasan_kmalloc+0xc4/0xe0 [ 309.261812] kasan_slab_alloc+0x12/0x20 [ 309.265761] kmem_cache_alloc_node+0x144/0x780 [ 309.270320] copy_process.part.38+0x16bf/0x6ee0 [ 309.274964] _do_fork+0x291/0x12a0 [ 309.278480] SyS_clone+0x37/0x50 [ 309.281827] do_syscall_64+0x29e/0x9d0 [ 309.285691] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.290851] [ 309.292454] Freed by task 20744: [ 309.295799] save_stack+0x43/0xd0 [ 309.299232] __kasan_slab_free+0x11a/0x170 [ 309.303442] kasan_slab_free+0xe/0x10 [ 309.307220] kmem_cache_free+0x86/0x2d0 [ 309.311172] free_task+0x166/0x1d0 [ 309.314690] __put_task_struct+0x2d2/0x600 [ 309.318904] delayed_put_task_struct+0x367/0x470 [ 309.323637] rcu_process_callbacks+0x941/0x15f0 [ 309.328282] __do_softirq+0x2e0/0xaf5 [ 309.332056] [ 309.333660] The buggy address belongs to the object at ffff8801ad554540 [ 309.333660] which belongs to the cache task_struct(76:syz0) of size 5952 [ 309.347165] The buggy address is located 56 bytes inside of [ 309.347165] 5952-byte region [ffff8801ad554540, ffff8801ad555c80) [ 309.359014] The buggy address belongs to the page: [ 309.363921] page:ffffea0006b55500 count:1 mapcount:0 mapping:ffff8801ad554540 index:0x0 compound_mapcount: 0 [ 309.373867] flags: 0x2fffc0000008100(slab|head) [ 309.378517] raw: 02fffc0000008100 ffff8801ad554540 0000000000000000 0000000100000001 [ 309.386378] raw: ffffea000761aaa0 ffffea0007169ea0 ffff8801b2c8f300 ffff8801b29b80c0 [ 309.394232] page dumped because: kasan: bad access detected [ 309.399916] page->mem_cgroup:ffff8801b29b80c0 [ 309.404383] [ 309.405985] Memory state around the buggy address: [ 309.410893] ffff8801ad554400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 309.418228] ffff8801ad554480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 309.425565] >ffff8801ad554500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 309.433069] ^ [ 309.440318] ffff8801ad554580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 309.447651] ffff8801ad554600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 309.454984] ================================================================== [ 309.462511] Kernel panic - not syncing: panic_on_warn set ... [ 309.462511] [ 309.469886] CPU: 1 PID: 4533 Comm: syz-executor0 Tainted: G B 4.16.0+ #2 [ 309.478018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.487366] Call Trace: [ 309.489957] dump_stack+0x1b9/0x294 [ 309.493594] ? dump_stack_print_info.cold.2+0x52/0x52 [ 309.498790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.503559] ? __mutex_lock+0x16f0/0x17f0 [ 309.507704] panic+0x22f/0x4de [ 309.510897] ? add_taint.cold.5+0x16/0x16 [ 309.515047] ? do_raw_spin_unlock+0x9e/0x2e0 [ 309.519455] ? do_raw_spin_unlock+0x9e/0x2e0 [ 309.523865] ? __mutex_lock+0x175f/0x17f0 [ 309.528014] kasan_end_report+0x47/0x4f [ 309.531989] kasan_report.cold.7+0xc9/0x2f5 [ 309.536312] __asan_report_load4_noabort+0x14/0x20 [ 309.541239] __mutex_lock+0x175f/0x17f0 [ 309.545212] ? debug_check_no_locks_freed+0x310/0x310 [ 309.550402] ? lo_ioctl+0x8d/0x1ec0 [ 309.554031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.559564] ? __d_lookup_rcu+0x54e/0xa80 [ 309.563709] ? mutex_trylock+0x2a0/0x2a0 [ 309.567858] ? lock_acquire+0x1dc/0x520 [ 309.571830] ? mntput_no_expire+0x158/0xba0 [ 309.576152] ? lock_downgrade+0x8e0/0x8e0 [ 309.580325] ? lockref_put_or_lock+0x6f/0x90 [ 309.584723] ? lock_release+0xa10/0xa10 [ 309.588686] ? dput.part.27+0x214/0x7b0 [ 309.592656] ? lock_downgrade+0x8e0/0x8e0 [ 309.596799] ? kasan_check_read+0x11/0x20 [ 309.600945] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 309.605525] ? mntput_no_expire+0x186/0xba0 [ 309.609824] ? _raw_spin_unlock+0x22/0x30 [ 309.613952] ? mnt_get_count+0x150/0x150 [ 309.617994] ? dput.part.27+0x242/0x7b0 [ 309.621951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.627466] ? bpf_prog_kallsyms_find+0xd6/0x4a0 [ 309.632200] ? lock_acquire+0x1dc/0x520 [ 309.636152] ? is_bpf_text_address+0xae/0x170 [ 309.640624] ? lock_downgrade+0x8e0/0x8e0 [ 309.644746] ? lock_release+0xa10/0xa10 [ 309.648699] ? kasan_check_read+0x11/0x20 [ 309.652823] ? rcu_is_watching+0x85/0x140 [ 309.656952] mutex_lock_killable_nested+0x16/0x20 [ 309.661774] ? mutex_lock_killable_nested+0x16/0x20 [ 309.666768] lo_ioctl+0x8d/0x1ec0 [ 309.670203] ? is_bpf_text_address+0xd7/0x170 [ 309.674675] ? kernel_text_address+0x79/0xf0 [ 309.679058] ? loop_clr_fd+0xb80/0xb80 [ 309.682924] blkdev_ioctl+0x9b6/0x2020 [ 309.686797] ? __save_stack_trace+0x7e/0xd0 [ 309.691097] ? blkpg_ioctl+0xc40/0xc40 [ 309.694966] ? save_stack+0xa9/0xd0 [ 309.698569] ? save_stack+0x43/0xd0 [ 309.702186] ? __kasan_slab_free+0x11a/0x170 [ 309.706572] ? kasan_slab_free+0xe/0x10 [ 309.710526] ? kmem_cache_free+0x86/0x2d0 [ 309.714657] ? putname+0xf2/0x130 [ 309.718085] ? do_sys_open+0x57f/0x770 [ 309.721946] ? SyS_open+0x2d/0x40 [ 309.725380] ? do_syscall_64+0x29e/0x9d0 [ 309.729427] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.734789] ? kasan_check_read+0x11/0x20 [ 309.738922] ? do_raw_spin_unlock+0x9e/0x2e0 [ 309.743307] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 309.747867] ? kasan_check_write+0x14/0x20 [ 309.752077] ? do_raw_spin_lock+0xc1/0x200 [ 309.756286] ? trace_hardirqs_off+0xd/0x10 [ 309.760495] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 309.765575] block_ioctl+0xee/0x130 [ 309.769180] ? blkdev_fallocate+0x400/0x400 [ 309.773486] do_vfs_ioctl+0x1cf/0x1650 [ 309.777358] ? ioctl_preallocate+0x2e0/0x2e0 [ 309.781744] ? fget_raw+0x20/0x20 [ 309.785173] ? trace_hardirqs_on+0xd/0x10 [ 309.789297] ? kmem_cache_free+0x22e/0x2d0 [ 309.793516] ? putname+0xf7/0x130 [ 309.796946] ? security_file_ioctl+0x94/0xc0 [ 309.801331] ksys_ioctl+0xa9/0xd0 [ 309.804761] SyS_ioctl+0x24/0x30 [ 309.808104] ? ksys_ioctl+0xd0/0xd0 [ 309.811706] do_syscall_64+0x29e/0x9d0 [ 309.815575] ? vmalloc_sync_all+0x30/0x30 [ 309.819700] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 309.824532] ? syscall_return_slowpath+0x5c0/0x5c0 [ 309.829438] ? syscall_return_slowpath+0x30f/0x5c0 [ 309.834342] ? prepare_exit_to_usermode+0x285/0x390 [ 309.839337] ? perf_trace_sys_enter+0xaf0/0xaf0 [ 309.843979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.848798] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.853975] RIP: 0033:0x455187 [ 309.857138] RSP: 002b:0000000000a3eab8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.864821] RAX: ffffffffffffffda RBX: 00000000000000f6 RCX: 0000000000455187 [ 309.872077] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000013 [ 309.879320] RBP: 0000000000000013 R08: 0000000000000000 R09: 000000000000000a [ 309.886562] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000013 [ 309.893815] R13: 0000000000000000 R14: 00000000006fe800 R15: 0000000000001380 [ 309.901525] Dumping ftrace buffer: [ 309.905039] (ftrace buffer empty) [ 309.908724] Kernel Offset: disabled [ 309.912325] Rebooting in 86400 seconds..