INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. 2018/04/21 01:45:21 fuzzer started 2018/04/21 01:45:21 dialing manager at 10.128.0.26:39431 syzkaller login: [ 53.528565] can: request_module (can-proto-0) failed. [ 53.537665] can: request_module (can-proto-0) failed. 2018/04/21 01:45:45 kcov=true, comps=true 2018/04/21 01:45:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1) 2018/04/21 01:45:47 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600)) 2018/04/21 01:45:47 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:45:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00') getdents(r0, &(0x7f0000000100)=""/98, 0x62) 2018/04/21 01:45:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:45:47 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0) 2018/04/21 01:45:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:45:47 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2) [ 57.377708] IPVS: ftp: loaded support on port[0] = 21 [ 57.397320] IPVS: ftp: loaded support on port[0] = 21 [ 57.422683] IPVS: ftp: loaded support on port[0] = 21 [ 57.425134] IPVS: ftp: loaded support on port[0] = 21 [ 57.434793] IPVS: ftp: loaded support on port[0] = 21 [ 57.447248] IPVS: ftp: loaded support on port[0] = 21 [ 57.484223] IPVS: ftp: loaded support on port[0] = 21 [ 57.510877] IPVS: ftp: loaded support on port[0] = 21 [ 59.612590] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.619123] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.661159] device bridge_slave_0 entered promiscuous mode [ 59.676119] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.682596] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.690771] device bridge_slave_0 entered promiscuous mode [ 59.710733] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.717146] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.726351] device bridge_slave_0 entered promiscuous mode [ 59.736233] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.742627] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.766680] device bridge_slave_0 entered promiscuous mode [ 59.781053] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.787468] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.797314] device bridge_slave_0 entered promiscuous mode [ 59.806422] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.812788] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.826247] device bridge_slave_1 entered promiscuous mode [ 59.839421] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.845821] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.866772] device bridge_slave_0 entered promiscuous mode [ 59.878879] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.885266] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.893482] device bridge_slave_1 entered promiscuous mode [ 59.901461] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.907857] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.925006] device bridge_slave_1 entered promiscuous mode [ 59.933952] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.940342] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.948496] device bridge_slave_1 entered promiscuous mode [ 59.955823] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.962247] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.971096] device bridge_slave_0 entered promiscuous mode [ 59.979862] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.992174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.001199] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.007613] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.031699] device bridge_slave_1 entered promiscuous mode [ 60.043611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.050873] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.057289] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.069247] device bridge_slave_0 entered promiscuous mode [ 60.086123] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.094298] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.100683] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.113163] device bridge_slave_1 entered promiscuous mode [ 60.119871] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.126287] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.147981] device bridge_slave_1 entered promiscuous mode [ 60.162077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.169611] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.179376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.189635] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.196079] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.214329] device bridge_slave_1 entered promiscuous mode [ 60.227163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.235439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.256925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.305812] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.314550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.345754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 60.366528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.402380] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.502761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.518817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.650329] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.681677] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.697680] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.724507] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.756741] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.771572] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.780638] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.794432] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.807096] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.846395] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.869892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.918968] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.928960] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.940695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.002719] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.118778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.125746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.135751] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.148558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.176766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.183756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.195915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.202828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.228262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.235177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.296587] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.303480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.360202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.375856] team0: Port device team_slave_0 added [ 61.504666] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.524617] team0: Port device team_slave_0 added [ 61.540286] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.547756] team0: Port device team_slave_1 added [ 61.555923] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.569793] team0: Port device team_slave_0 added [ 61.590427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.605278] team0: Port device team_slave_0 added [ 61.623787] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.640525] team0: Port device team_slave_0 added [ 61.654268] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.668457] team0: Port device team_slave_1 added [ 61.673966] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.689010] team0: Port device team_slave_0 added [ 61.694559] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.707497] team0: Port device team_slave_1 added [ 61.726287] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.742955] team0: Port device team_slave_0 added [ 61.751643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.765556] team0: Port device team_slave_0 added [ 61.774103] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.794224] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.802506] team0: Port device team_slave_1 added [ 61.814530] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.829118] team0: Port device team_slave_1 added [ 61.836924] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.850057] team0: Port device team_slave_1 added [ 61.880513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.894368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.914619] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.925563] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.934741] team0: Port device team_slave_1 added [ 61.939996] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.947394] team0: Port device team_slave_1 added [ 61.963833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.979185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.988064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.002902] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.023981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.049589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.062898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.074292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.083618] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.091951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.116431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.131603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.139880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.147635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.155632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.162618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.170825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.180354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.187680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.195785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.206770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.215369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.224954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.232772] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.240831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.247985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.281546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.312830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.332880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.347236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.355644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.363423] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.371111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.378529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.386425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.394137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.401827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.409587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.417285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.424690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.432438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.447358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.456917] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.464082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.481555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.502266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.517110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.532711] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.541351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.549324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.559839] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.568716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.585248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.614558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.641331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.649534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.657510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.665341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.673119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.681892] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.692369] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.716870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.730055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.764570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.781141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.795078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.802532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.812360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.823534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.844492] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.854396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.866698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.890559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.913147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.778303] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.784850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.791833] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.798224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.838614] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.946584] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.953065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.959730] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.966120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.981131] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.992651] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.999076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.005747] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.012112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.021309] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.030267] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.036647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.043294] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.049669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.057939] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.103414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.124815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.162577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.191301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.206490] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.212890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.219510] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.225866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.237966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.247463] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.253859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.260531] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.266907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.289384] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.310449] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.316876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.323548] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.329929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.349245] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.360856] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.367266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.373946] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.380327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.439995] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.119283] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.142778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.176295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.188222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.016246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.047707] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.141085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.182327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.231841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.278705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.381284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.407476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.474693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.554953] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.626586] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.635933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.667845] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.775608] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.884997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.928759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 69.953762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 69.960091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.976535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.078794] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.085547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.092703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.127259] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.134892] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.142889] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.149536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.168364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.198533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.220861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.227806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.234922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.270687] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.285447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.316552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.474162] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.480375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.491270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.514777] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 70.521153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.533484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.567232] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.590974] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.621263] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.642706] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.728073] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.805760] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.999186] 8021q: adding VLAN 0 to HW filter on device team0 [ 71.027807] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/21 01:46:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600)) 2018/04/21 01:46:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:03 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2) 2018/04/21 01:46:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0) 2018/04/21 01:46:03 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2) 2018/04/21 01:46:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600)) 2018/04/21 01:46:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0) 2018/04/21 01:46:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1) 2018/04/21 01:46:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:04 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000874000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}}}}, 0xaa6886e63ad3e5c2) 2018/04/21 01:46:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00') getdents(r0, &(0x7f0000000100)=""/98, 0x62) 2018/04/21 01:46:04 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:04 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002fd8)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r1}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x4, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x1f4, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}, 0x1}, 0x0) 2018/04/21 01:46:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0xae44, &(0x7f0000000600)) 2018/04/21 01:46:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00') getdents(r0, &(0x7f0000000100)=""/98, 0x62) 2018/04/21 01:46:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1) 2018/04/21 01:46:05 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:05 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000ff0)='fdinfo\x00') getdents(r0, &(0x7f0000000100)=""/98, 0x62) 2018/04/21 01:46:05 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040), 0x1) 2018/04/21 01:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f000098dffc)=0x20006, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000200)={0x6, 0x3, 0x400, 0x7, &(0x7f0000000140)=[{}, {}, {}]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x200000000000002, 0x4) lseek(r1, 0x0, 0x3) bind$inet6(r0, &(0x7f0000807fe4)={0xa, 0x4e22}, 0x1c) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x5, @empty, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000976000), 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x0, &(0x7f0000254000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) 2018/04/21 01:46:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:46:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:06 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:06 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:06 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:06 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00') syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00') 2018/04/21 01:46:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:46:07 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00') syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00') 2018/04/21 01:46:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000680)={"6c6f00000000001400000900", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv4_newaddr={0x34, 0x14, 0x505, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x5, 0x8}}, @IFA_LOCAL={0x8, 0x2, @multicast1=0xe0000001}]}, 0x34}, 0x1}, 0x0) 2018/04/21 01:46:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f00000003c0), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x160, &(0x7f0000000080), 0x1}}], 0x800000000000221, 0x0, &(0x7f0000001cc0)={0x77359400}) shutdown(r0, 0x0) 2018/04/21 01:46:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') 2018/04/21 01:46:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:46:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:07 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000a8bfff)=""/1, 0x805031ae) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) 2018/04/21 01:46:07 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]}) 2018/04/21 01:46:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') 2018/04/21 01:46:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:46:07 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00') syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00') 2018/04/21 01:46:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:46:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') 2018/04/21 01:46:07 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='ns/ipc\x00') syz_open_procfs(0x0, &(0x7f0000000000)='ns/ipc\x00') 2018/04/21 01:46:07 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]}) 2018/04/21 01:46:07 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000004000)={0x1d}, 0x10, &(0x7f0000002ff0)={&(0x7f0000004fb8)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0x48}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00005e4000)={&(0x7f0000000040)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f00000aef80)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "e2ba079c66681a29"}}, 0x48}, 0x1}, 0x0) 2018/04/21 01:46:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/21 01:46:08 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00009db000)='./file1\x00') 2018/04/21 01:46:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]}) 2018/04/21 01:46:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8) 2018/04/21 01:46:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180)) 2018/04/21 01:46:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0) 2018/04/21 01:46:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]}) 2018/04/21 01:46:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1) read(r0, &(0x7f0000000300)=""/150, 0x96) 2018/04/21 01:46:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8) [ 78.337399] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 2018/04/21 01:46:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0) 2018/04/21 01:46:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/21 01:46:08 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0xaf01, &(0x7f0000307000)=&(0x7f0000989fff)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000df5fd8)={0x0, 0x0, &(0x7f0000000200)=""/105, &(0x7f0000bf6000)=""/228, &(0x7f0000000080)=""/199}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000cef000)={0x1, 0x0, &(0x7f000062a000)=""/167, &(0x7f0000aac000)=""/21, &(0x7f00002fdf52)=""/174}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000f82ffc)=0x4001) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)={0x1, 0x0, [{0x0, 0xfffffffffffffdc0, &(0x7f0000000500)=""/41}]}) 2018/04/21 01:46:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180)) [ 78.427636] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 78.437096] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 2018/04/21 01:46:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1) read(r0, &(0x7f0000000300)=""/150, 0x96) 2018/04/21 01:46:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0) 2018/04/21 01:46:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8) 2018/04/21 01:46:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) [ 78.586711] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 78.659744] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 78.669586] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 2018/04/21 01:46:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180)) 2018/04/21 01:46:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1) read(r0, &(0x7f0000000300)=""/150, 0x96) 2018/04/21 01:46:08 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ppoll(&(0x7f0000000080)=[{r0, 0x475}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0x7fffffffffffffff}, 0x8) 2018/04/21 01:46:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=[{0x18, 0x1000000000000001, 0x1, "13"}], 0x18}, 0x0) 2018/04/21 01:46:08 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]}) 2018/04/21 01:46:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000500)={0x2c15c010}) 2018/04/21 01:46:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:08 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000)) close(r1) 2018/04/21 01:46:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:08 executing program 4: r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 2018/04/21 01:46:08 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x146}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xe, 0x0, 0x9, &(0x7f0000000180)) 2018/04/21 01:46:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000bfa000)="b6d3b85e1e8d225db3f3b29d7300000005cc796aed5ed2bc7018ce2c9b97ae21914d870000ffffbc9b16", 0x2a) write(r0, &(0x7f0000e8efa7)="dbef803e3d9f5de1e52055bb7c8a326fe46092b6682d9ad789c5d7acad0e771f13d8cb59029b011ded54a09c41c6cfcfbcd743cc665c32af223d42438b496a0304891c88697aff07d4a70f330e6fe3a1c9c76f314ffab329", 0x58) writev(r0, &(0x7f00001b6f90)=[{&(0x7f0000000040)="e59bc053050000007bb51f597ea6feb27c6371100ca6f5c53ded1a2f0fd1c92c1f8082d61217feadb3af", 0x2a}], 0x1) read(r0, &(0x7f0000000300)=""/150, 0x96) [ 78.844166] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 2018/04/21 01:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) [ 78.972894] ntfs: (device loop0): read_ntfs_boot_sector(): Could not find a valid backup boot sector. [ 78.982427] ntfs: (device loop0): ntfs_fill_super(): Not an NTFS volume. 2018/04/21 01:46:09 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000)) close(r1) 2018/04/21 01:46:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f000060c000)='auxv\x00') read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/21 01:46:09 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil) 2018/04/21 01:46:09 executing program 4: r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 2018/04/21 01:46:09 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]}) 2018/04/21 01:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil) 2018/04/21 01:46:09 executing program 4: r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 2018/04/21 01:46:09 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000)) close(r1) 2018/04/21 01:46:09 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) [ 79.244760] ntfs: (device loop0): read_ntfs_boot_sector(): Primary boot sector is invalid. 2018/04/21 01:46:09 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil) 2018/04/21 01:46:09 executing program 0: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f00000004c0), 0x0, 0x7110}], 0x0, &(0x7f0000000240)={[{@errors_recover='errors=recover', 0x2c}, {@gid={'gid', 0x3d, [0x38, 0x0]}, 0x2c}]}) 2018/04/21 01:46:09 executing program 6: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000a000)) close(r1) 2018/04/21 01:46:09 executing program 4: r0 = memfd_create(&(0x7f0000813ffa)='ramfs\x00', 0x0) ioctl$TCSETA(r0, 0x4030582a, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}) 2018/04/21 01:46:09 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f6367726f7570000478d081", 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000001c0)='pids.max\x00', 0x2, 0x0) read(r1, &(0x7f0000000040)=""/239, 0xef) write$cgroup_int(r1, &(0x7f0000000040), 0x1e4) 2018/04/21 01:46:09 executing program 1: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x7ffffffff000, 0x3, &(0x7f0000c87000/0x2000)=nil) 2018/04/21 01:46:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff) 2018/04/21 01:46:09 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4) 2018/04/21 01:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:46:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]}) 2018/04/21 01:46:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/04/21 01:46:09 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580)) 2018/04/21 01:46:09 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:09 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) 2018/04/21 01:46:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:46:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff) 2018/04/21 01:46:10 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4) 2018/04/21 01:46:10 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/04/21 01:46:10 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200000400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getgid() getgroups(0x40000000000001f9, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]) setgid(r1) mknod$loop(&(0x7f0000683000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000144000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000bd2ffc)='nfs\x00', 0x0, &(0x7f000000a000)) kexec_load(0x8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000180)="e15da901e33c1d85367cacfed2bb91a2c58223096276ce7531561628f55e4047be607360328d955994b594c35d2d632fc9255ee95682c4474cbee78544bfdae83b88308abbfaa0eb6c58c9186dfe86312d63286554a1c2ba8dfe69e864a26a365a7b06c0c6e4769da53be5fe0f924fbfff3e527f1391f1e5a43bb0ab3b03ad952280355d4bf28b56e171fdcf8a8b9d2f2136bdcb0e25da6cad312c33b8a594aebee87c28a4a1ab3669e841526a3b56ab85735b96a79e9d893cf7ca417af614c6a917c992a58a8d695d42e79da3866012da1ccfbfaeb553", 0xd7, 0x3, 0x100000001}, {&(0x7f0000000340)="ef3dd61a50d8bc1a15391aca0fc947db3ac2996654ce15807a0dd73b27eace95", 0x20, 0x3, 0x1000}], 0xa0000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x80000) getsockopt$inet6_int(r2, 0x29, 0x3f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000080)="ffce1c1c39748e05f45c1d50a4dba670", 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000140)={0x7, 0x4e2, 0x6, 0x6, 0x8}) 2018/04/21 01:46:10 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580)) 2018/04/21 01:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:46:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]}) 2018/04/21 01:46:10 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) 2018/04/21 01:46:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000020ff4)={0x10}, 0xc, &(0x7f000000d379)={&(0x7f0000020000)={0x13, 0x19, 0x401, 0x0, 0x0, {0x1d, 0x2, 0xf}}, 0x14}, 0x1}, 0x0) 2018/04/21 01:46:10 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4) 2018/04/21 01:46:10 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/04/21 01:46:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff) 2018/04/21 01:46:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c) 2018/04/21 01:46:10 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580)) 2018/04/21 01:46:10 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) 2018/04/21 01:46:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/21 01:46:10 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000080)="130000001000ffdde200f49ff60f05001b230a009d0000000f7fcb3c189814e301000000f949a1b4b88ed4fc65be060202000000f1da8ed7c06c7e00f70000d8a43d585282cd0001e42d732747442d1f90f26af0982d800000000006518c2c681bbce9ec3c3f8612f026723affc1681de8f100c8eec8a70935b80a7f41c08ffa56b97c987c4d465ddab5439b20db0f7e5bf12930d837b9cb3349b6c440007d886959eaeb01800000000000001ad5b56d2a91e1a70000000000000000000000914393c7d8", 0xc4) 2018/04/21 01:46:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]}) 2018/04/21 01:46:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c) 2018/04/21 01:46:10 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/04/21 01:46:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000076ff8), 0xffffffff) 2018/04/21 01:46:10 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000580)) 2018/04/21 01:46:10 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) [ 80.376851] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/21 01:46:10 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c) 2018/04/21 01:46:10 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r1, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) 2018/04/21 01:46:10 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) [ 80.472338] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.479682] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/21 01:46:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:46:10 executing program 3: open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) lseek(r0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ftruncate(r1, 0x0) [ 80.593097] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. [ 80.682788] netlink: 'syz-executor0': attribute type 1 has an invalid length. 2018/04/21 01:46:11 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa}, 0x1c) 2018/04/21 01:46:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000140)={0x1, 0x0, [{0x4b564d03, 0x0, 0x2000000}]}) 2018/04/21 01:46:11 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/21 01:46:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/04/21 01:46:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:46:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/21 01:46:11 executing program 3: open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) lseek(r0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ftruncate(r1, 0x0) 2018/04/21 01:46:11 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) 2018/04/21 01:46:11 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) [ 81.693161] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 81.712168] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/21 01:46:11 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/21 01:46:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/21 01:46:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/04/21 01:46:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:46:11 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) [ 81.835697] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/21 01:46:12 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) read$eventfd(r1, &(0x7f0000000100), 0x8) 2018/04/21 01:46:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) [ 81.902857] netlink: 'syz-executor0': attribute type 1 has an invalid length. [ 82.011219] netlink: 28 bytes leftover after parsing attributes in process `syz-executor2'. 2018/04/21 01:46:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/04/21 01:46:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000000e000)={&(0x7f00005e4000)={0x18, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@nested={0x4, 0x200000000000001}]}, 0x18}, 0x1}, 0x0) 2018/04/21 01:46:12 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}}) 2018/04/21 01:46:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/21 01:46:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480)) 2018/04/21 01:46:12 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) 2018/04/21 01:46:12 executing program 3: open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) lseek(r0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ftruncate(r1, 0x0) 2018/04/21 01:46:12 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) [ 82.669745] netlink: 'syz-executor0': attribute type 1 has an invalid length. 2018/04/21 01:46:12 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}}) 2018/04/21 01:46:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 2018/04/21 01:46:12 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000) 2018/04/21 01:46:12 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480)) 2018/04/21 01:46:12 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/21 01:46:12 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}}) 2018/04/21 01:46:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x20, 0x0, 0x400) 2018/04/21 01:46:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480)) 2018/04/21 01:46:13 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000) 2018/04/21 01:46:13 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/route\x00') sendfile(r0, r0, &(0x7f0000b58000)=0x200000, 0xffff) 2018/04/21 01:46:13 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0xffffff92}, {0xe0}}) 2018/04/21 01:46:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x20, 0x0, 0x400) 2018/04/21 01:46:13 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) 2018/04/21 01:46:13 executing program 3: open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r1 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f0000000300)="d8", 0x1) sendfile(r1, r1, &(0x7f0000000040), 0x7527fb3200000000) lseek(r0, 0x0, 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) ftruncate(r1, 0x0) 2018/04/21 01:46:13 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000fbef6d)=""/185, 0xb9, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x0) 2018/04/21 01:46:13 executing program 7: r0 = inotify_init() r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 2018/04/21 01:46:13 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x7d}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x7fffffffefff, 0x0, 0x0, &(0x7f0000000480)) 2018/04/21 01:46:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x20, 0x0, 0x400) 2018/04/21 01:46:13 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000) 2018/04/21 01:46:13 executing program 7: r0 = inotify_init() r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 2018/04/21 01:46:13 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:13 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setopts(0x3, r1, 0x0, 0x2000000000000000) 2018/04/21 01:46:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x20, 0x0, 0x400) [ 83.972977] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:46:14 executing program 7: r0 = inotify_init() r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 2018/04/21 01:46:14 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:14 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:14 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81) write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) 2018/04/21 01:46:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:14 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/21 01:46:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/21 01:46:14 executing program 7: r0 = inotify_init() r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 2018/04/21 01:46:14 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) [ 84.592155] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 84.592233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:46:14 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81) write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) 2018/04/21 01:46:14 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/21 01:46:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:14 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0xb, r0) 2018/04/21 01:46:14 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:14 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/21 01:46:14 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81) write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) [ 84.864404] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 84.916703] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:46:15 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x6) 2018/04/21 01:46:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/21 01:46:15 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$intptr(0x2b, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:46:15 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0xb, r0) 2018/04/21 01:46:15 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000fee)='/dev/snd/pcmC#D#p\x00', 0x0, 0x81) write$fuse(r0, &(0x7f0000002fd8)={0x28, 0x0, 0x0, @fuse_notify_inval_inode_out}, 0x28) 2018/04/21 01:46:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:15 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/21 01:46:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x1c) close(r0) r2 = accept4(r1, &(0x7f0000c71000)=@alg, &(0x7f0000715ffc)=0x58, 0x0) sendmmsg(r2, &(0x7f000000a200)=[{{0x0, 0x0, &(0x7f0000000600)}}, {{&(0x7f0000006040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006080)='y', 0x1}], 0x1, &(0x7f0000006200)}}], 0x2, 0x4040800) 2018/04/21 01:46:15 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0xb, r0) 2018/04/21 01:46:15 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') [ 85.087570] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 85.098681] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/21 01:46:15 executing program 1: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000804000)) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) 2018/04/21 01:46:15 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x7, 0x1f, 0x1, 0x1, 0x1}], {0x95}}, &(0x7f000031cff6)='syzkaller\x00', 0x5c6e, 0x2f8, &(0x7f00001a7f05)=""/251}, 0x48) 2018/04/21 01:46:15 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30) 2018/04/21 01:46:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"}) 2018/04/21 01:46:15 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'syzkaller0\x00', 0xb}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0xa, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) 2018/04/21 01:46:15 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') [ 85.236508] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) 2018/04/21 01:46:16 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0xb, r0) 2018/04/21 01:46:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) 2018/04/21 01:46:16 executing program 3: umount2(&(0x7f00000006c0)='//file0\x00', 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'}) write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[]) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x10009) sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff) r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe) fallocate(r3, 0x1, 0x0, 0x10000101) 2018/04/21 01:46:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30) 2018/04/21 01:46:16 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') 2018/04/21 01:46:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"}) 2018/04/21 01:46:16 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$intptr(0x2b, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/21 01:46:16 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001400000000000000000000000800120000000300000000000000000006000000000000000000000000000000e00000000001000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030000000000000002000000ac14ffbb000000000000000004"], 0x7c}, 0x1}, 0x0) chroot(&(0x7f0000000140)='./file0\x00') bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:46:16 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30) 2018/04/21 01:46:16 executing program 7: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000)) 2018/04/21 01:46:16 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='ip6_vti0\x00') 2018/04/21 01:46:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"}) 2018/04/21 01:46:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) [ 87.033104] ISOFS: Unable to identify CD-ROM format. [ 87.270044] ISOFS: Unable to identify CD-ROM format. 2018/04/21 01:46:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x2, 0x2) write$evdev(r0, &(0x7f0000000240)=[{{0x0, 0x2710}, 0x4, 0x4}, {}], 0x30) 2018/04/21 01:46:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) 2018/04/21 01:46:17 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x10}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000300)="c16a00012e260f01ca0f300f350f20e06635000100000f22e066b8ef0000000f23c80f21f866350c00e0000f23f80f21976766c7442400a56c05676766c7442402af3f00006766c744240600000000670f011424b8f1008ee80faeaf0100", 0x5e}], 0x1, 0x0, &(0x7f0000000100), 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f0000000100)={{&(0x7f0000000040)=""/38, 0x26}, &(0x7f0000000080)}, 0x20) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d00001400000000000000000000000800120000000300000000000000000006000000000000000000000000000000e00000000001000000000000000000000000000000000000000000030006000000000002000000ac14ffbb0000000000000000030000000000000002000000ac14ffbb000000000000000004"], 0x7c}, 0x1}, 0x0) chroot(&(0x7f0000000140)='./file0\x00') bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/04/21 01:46:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) 2018/04/21 01:46:17 executing program 7: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000)) 2018/04/21 01:46:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000001640)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000001680)={0x8, "b3b75cda919b1d38"}) 2018/04/21 01:46:17 executing program 3: umount2(&(0x7f00000006c0)='//file0\x00', 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'}) write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[]) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x10009) sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff) r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe) fallocate(r3, 0x1, 0x0, 0x10000101) 2018/04/21 01:46:17 executing program 4: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) connect$netlink(r0, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, &(0x7f0000cfefee), 0x209, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000380)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$intptr(0x2b, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 87.423504] syz-executor3 (7520) used greatest stack depth: 15400 bytes left 2018/04/21 01:46:17 executing program 5: umount2(&(0x7f00000006c0)='//file0\x00', 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000440)={0x3, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='sit0\x00'}) write(r0, &(0x7f0000001300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd59238", 0x30) sendfile(r0, r0, &(0x7f0000000040), 0x7527fb3200000000) syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f00000014c0)='//file0\x00', 0x7, 0x0, &(0x7f0000003c80), 0x2, &(0x7f0000000100)=ANY=[]) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x0) truncate(&(0x7f0000000400)='./file0\x00', 0x10009) sendfile(r2, r1, &(0x7f0000002b80), 0x7fffffff) r3 = open(&(0x7f0000000240)='./file0\x00', 0x141042, 0xfffffffffffffffe) fallocate(r3, 0x1, 0x0, 0x10000101) 2018/04/21 01:46:17 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockname$llc(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) 2018/04/21 01:46:17 executing program 7: r0 = memfd_create(&(0x7f0000002000)="2f7b06003170707031253a656d30f9", 0x0) write$evdev(r0, &(0x7f0000001000)=[{{}, 0x0, 0x0, 0x80000004}], 0x18) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001000)={{}, {0x0, 0x989680}}, &(0x7f0000005000)) 2018/04/21 01:46:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) 2018/04/21 01:46:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000b5a000)={0x0, 0x70, 0x1e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) capset(&(0x7f0000000340)={0x19980330}, &(0x7f0000000080)) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000100)) getsockname$packet(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002900)=0x14) [ 87.650258] ================================================================== [ 87.658383] BUG: KASAN: null-ptr-deref in refcount_inc_not_zero+0x8f/0x2d0 [ 87.665405] Read of size 4 at addr 0000000000000004 by task syz-executor2/7543 [ 87.672763] [ 87.674407] CPU: 0 PID: 7543 Comm: syz-executor2 Not tainted 4.17.0-rc1+ #10 [ 87.681595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.690952] Call Trace: [ 87.693540] dump_stack+0x1b9/0x294 [ 87.697158] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.702341] ? kasan_check_write+0x14/0x20 [ 87.706563] ? do_raw_spin_lock+0xc1/0x200 [ 87.710785] ? vprintk_func+0x81/0xe7 [ 87.714575] ? refcount_inc_not_zero+0x8f/0x2d0 [ 87.719230] kasan_report.cold.7+0x6d/0x2fe [ 87.723542] check_memory_region+0x13e/0x1b0 [ 87.727944] kasan_check_read+0x11/0x20 [ 87.731904] refcount_inc_not_zero+0x8f/0x2d0 [ 87.736393] ? refcount_add_not_zero+0x320/0x320 [ 87.741136] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 87.746148] ? lock_sock_nested+0x9f/0x120 [ 87.750383] refcount_inc+0x15/0x70 [ 87.754017] llc_ui_release+0xba/0x2b0 [ 87.757903] ? fsnotify_first_mark+0x330/0x330 [ 87.762478] sock_release+0x96/0x1b0 [ 87.766273] ? sock_alloc_file+0x4e0/0x4e0 [ 87.770495] sock_close+0x16/0x20 [ 87.773941] __fput+0x34d/0x890 [ 87.777227] ? fput+0x1a0/0x1a0 [ 87.780511] ? _raw_spin_unlock_irq+0x27/0x70 [ 87.784993] ____fput+0x15/0x20 [ 87.788261] task_work_run+0x1e4/0x290 [ 87.792146] ? task_work_cancel+0x240/0x240 [ 87.796459] ? switch_task_namespaces+0xbd/0xd0 [ 87.801118] do_exit+0x1aee/0x2730 [ 87.804670] ? mm_update_next_owner+0x980/0x980 [ 87.809324] ? print_usage_bug+0xc0/0xc0 [ 87.813373] ? check_same_owner+0x320/0x320 [ 87.817783] ? do_raw_spin_unlock+0x9e/0x2e0 [ 87.822180] ? rcu_note_context_switch+0x710/0x710 [ 87.827093] ? lock_acquire+0x1dc/0x520 [ 87.831143] ? __might_sleep+0x95/0x190 [ 87.835105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.840629] ? __lock_acquire+0x7f5/0x5140 [ 87.844853] ? kasan_check_write+0x14/0x20 [ 87.849089] ? do_raw_spin_lock+0xc1/0x200 [ 87.853319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.858846] ? debug_check_no_locks_freed+0x310/0x310 [ 87.864036] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 87.869214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.874735] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 87.879824] ? futex_wait+0x5c1/0x9f0 [ 87.883610] ? perf_trace_lock+0xd6/0x900 [ 87.887748] ? zap_class+0x720/0x720 [ 87.891449] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 87.896626] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 87.902148] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 87.907236] ? futex_wake+0x2f6/0x750 [ 87.911037] ? graph_lock+0x170/0x170 [ 87.914829] ? memset+0x31/0x40 [ 87.918097] ? find_held_lock+0x36/0x1c0 [ 87.922149] ? lock_downgrade+0x8e0/0x8e0 [ 87.926290] do_group_exit+0x16f/0x430 [ 87.930164] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 87.934732] ? __ia32_sys_exit+0x50/0x50 [ 87.938779] ? _raw_spin_unlock_irq+0x27/0x70 [ 87.943262] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 87.948267] get_signal+0x886/0x1960 [ 87.951973] ? ptrace_notify+0x130/0x130 [ 87.956028] ? graph_lock+0x170/0x170 [ 87.959814] ? rcu_is_watching+0x85/0x140 [ 87.963951] ? mntput_no_expire+0x186/0xba0 [ 87.968258] ? dentry_kill+0xce/0x5a0 [ 87.972043] ? mnt_get_count+0x150/0x150 [ 87.976091] ? find_held_lock+0x36/0x1c0 [ 87.980141] do_signal+0x98/0x2040 [ 87.983670] ? lock_downgrade+0x8e0/0x8e0 [ 87.987805] ? setup_sigcontext+0x7d0/0x7d0 [ 87.992114] ? kasan_check_read+0x11/0x20 [ 87.996257] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.000653] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 88.005226] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.009707] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.014720] ? exit_to_usermode_loop+0x87/0x310 [ 88.019377] exit_to_usermode_loop+0x28a/0x310 [ 88.023946] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 88.028773] ? fput+0x130/0x1a0 [ 88.032042] ? do_syscall_64+0x92/0x800 [ 88.036006] do_syscall_64+0x6ac/0x800 [ 88.039884] ? finish_task_switch+0x1ca/0x810 [ 88.044372] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.049290] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.054205] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 88.059558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.064388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.069565] RIP: 0033:0x455389 [ 88.072736] RSP: 002b:00007f0bc1a26ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 88.080427] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 88.087681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 88.095121] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 88.102372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 88.109626] R13: 00007ffdb5b2541f R14: 00007f0bc1a279c0 R15: 0000000000000000 [ 88.116905] ================================================================== [ 88.124251] Disabling lock debugging due to kernel taint [ 88.129958] Kernel panic - not syncing: panic_on_warn set ... [ 88.129958] [ 88.137328] CPU: 0 PID: 7543 Comm: syz-executor2 Tainted: G B 4.17.0-rc1+ #10 [ 88.145899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.155245] Call Trace: [ 88.157836] dump_stack+0x1b9/0x294 [ 88.161465] ? dump_stack_print_info.cold.2+0x52/0x52 [ 88.166659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 88.171425] ? refcount_add_not_zero+0x300/0x320 [ 88.176186] panic+0x22f/0x4de [ 88.179381] ? add_taint.cold.5+0x16/0x16 [ 88.183534] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.187945] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.192364] ? refcount_inc_not_zero+0x8f/0x2d0 [ 88.197031] kasan_end_report+0x47/0x4f [ 88.201003] kasan_report.cold.7+0x76/0x2fe [ 88.205333] check_memory_region+0x13e/0x1b0 [ 88.209744] kasan_check_read+0x11/0x20 [ 88.213720] refcount_inc_not_zero+0x8f/0x2d0 [ 88.218221] ? refcount_add_not_zero+0x320/0x320 [ 88.222978] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.228002] ? lock_sock_nested+0x9f/0x120 [ 88.232245] refcount_inc+0x15/0x70 [ 88.235880] llc_ui_release+0xba/0x2b0 [ 88.239767] ? fsnotify_first_mark+0x330/0x330 [ 88.244355] sock_release+0x96/0x1b0 [ 88.248074] ? sock_alloc_file+0x4e0/0x4e0 [ 88.252318] sock_close+0x16/0x20 [ 88.255774] __fput+0x34d/0x890 [ 88.259057] ? fput+0x1a0/0x1a0 [ 88.262346] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.266892] ____fput+0x15/0x20 [ 88.270173] task_work_run+0x1e4/0x290 [ 88.274066] ? task_work_cancel+0x240/0x240 [ 88.278391] ? switch_task_namespaces+0xbd/0xd0 [ 88.283066] do_exit+0x1aee/0x2730 [ 88.286612] ? mm_update_next_owner+0x980/0x980 [ 88.291283] ? print_usage_bug+0xc0/0xc0 [ 88.295347] ? check_same_owner+0x320/0x320 [ 88.299670] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.304082] ? rcu_note_context_switch+0x710/0x710 [ 88.309016] ? lock_acquire+0x1dc/0x520 [ 88.313001] ? __might_sleep+0x95/0x190 [ 88.316991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.322536] ? __lock_acquire+0x7f5/0x5140 [ 88.326870] ? kasan_check_write+0x14/0x20 [ 88.331114] ? do_raw_spin_lock+0xc1/0x200 [ 88.335356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.340906] ? debug_check_no_locks_freed+0x310/0x310 [ 88.346106] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 88.351305] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 88.354994] ISOFS: Unable to identify CD-ROM format. [ 88.356845] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 88.356859] ? futex_wait+0x5c1/0x9f0 [ 88.356878] ? perf_trace_lock+0xd6/0x900 [ 88.356894] ? zap_class+0x720/0x720 [ 88.378724] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 88.383924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 88.389466] ? drop_futex_key_refs.isra.13+0x6d/0xe0 [ 88.394575] ? futex_wake+0x2f6/0x750 [ 88.398378] ? graph_lock+0x170/0x170 [ 88.402191] ? memset+0x31/0x40 [ 88.405476] ? find_held_lock+0x36/0x1c0 [ 88.409546] ? lock_downgrade+0x8e0/0x8e0 [ 88.413705] do_group_exit+0x16f/0x430 [ 88.417600] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 88.422274] ? __ia32_sys_exit+0x50/0x50 [ 88.426353] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.430853] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.435895] get_signal+0x886/0x1960 [ 88.439620] ? ptrace_notify+0x130/0x130 [ 88.440790] ISOFS: Unable to identify CD-ROM format. [ 88.443684] ? graph_lock+0x170/0x170 [ 88.443699] ? rcu_is_watching+0x85/0x140 [ 88.443715] ? mntput_no_expire+0x186/0xba0 [ 88.443728] ? dentry_kill+0xce/0x5a0 [ 88.443739] ? mnt_get_count+0x150/0x150 [ 88.443754] ? find_held_lock+0x36/0x1c0 [ 88.472998] do_signal+0x98/0x2040 [ 88.476545] ? lock_downgrade+0x8e0/0x8e0 [ 88.480699] ? setup_sigcontext+0x7d0/0x7d0 [ 88.485030] ? kasan_check_read+0x11/0x20 [ 88.489189] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.493599] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 88.498190] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.502720] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.507748] ? exit_to_usermode_loop+0x87/0x310 [ 88.512420] exit_to_usermode_loop+0x28a/0x310 [ 88.516991] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 88.521824] ? fput+0x130/0x1a0 [ 88.525087] ? do_syscall_64+0x92/0x800 [ 88.529048] do_syscall_64+0x6ac/0x800 [ 88.532925] ? finish_task_switch+0x1ca/0x810 [ 88.537406] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.542320] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.547245] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 88.552598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.557436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 88.562606] RIP: 0033:0x455389 [ 88.565778] RSP: 002b:00007f0bc1a26ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 88.573479] RAX: 0000000000000000 RBX: 000000000072bec8 RCX: 0000000000455389 [ 88.580732] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 88.587993] RBP: 000000000072bec8 R08: 0000000000000000 R09: 000000000072bea0 [ 88.595255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 88.602593] R13: 00007ffdb5b2541f R14: 00007f0bc1a279c0 R15: 0000000000000000 [ 88.610398] Dumping ftrace buffer: [ 88.613921] (ftrace buffer empty) [ 88.617607] Kernel Offset: disabled [ 88.621215] Rebooting in 86400 seconds..