b725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba44") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:40 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x0, 0x80) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000440)=""/109) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) getsockname(r1, &(0x7f0000000340)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000000)=0x80) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000003c0)=0xffff, 0x4) write(r1, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r1, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:40 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:40 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}], 0x2, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000280)="13175bb0d4697b6538c9e454d6bde41d19307a343a0c1696cd7c54582ba09111fc8c6ee42dc9b10bd005d704e9fd1559c9abe2dcd3b7eff5f2d1261d89143fa1e8268cdf216a36084b43b7b73dcace6ad5fe9056aba586eb11532823115af8626b1dadd2e22b88effe6391b764ca46108dd7a13664fd0a4408d3fa434fa7c141d781f1928c5d50a2c741ed05fd08f7e7dc53279d305f08584312e0d663c5d819e73a8b0ab52b091f2243b25463b9e9ddcedee2f83df777eb8394954a4bcd55") perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) munlockall() getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) ioctl$VT_ACTIVATE(r4, 0x5606, 0xb7) fsetxattr(r3, &(0x7f0000000080)=@random={'os2.', '/dev/kvm\x00'}, &(0x7f00000001c0)='/dev/loop#\x00', 0xb, 0x1) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:40 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000340)="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", 0xffffffffffffff9a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit={0x95}], &(0x7f0000000180)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000640)=""/4096, 0x40f00, 0x1, [], r3}, 0x48) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:40 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}], 0x2, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:40 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000004c0)={0x1, [0x2]}, 0x6) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1ff, 0x100) listen$netrom(r3, 0x3000000) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:41 executing program 1 (fault-call:14 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x7f, 0x200a42) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000400)=0x88, 0x4) write(r0, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000443000000007737f38aef6236bba700c533000000df3a51362aed1e1ec509ceed943e3ac2573e57fd58849048eb7b5e3d68db6b9c247570df230f6d2dc4fccdb18d15835d407a4dad8a53a12f8c946714affdb166d9fbacd8fba893982d9a3f8872b5a370b3d7ad4ccb4b489c7b9eba5d7c1870fdba9eca15a8f697b54a2bec5bbd35a8c01b727cc97bc002bd3f2cc975f26443ad0714ce89ea62d72a05087bbd2335715d5343b2b62f2bf254a7a611961a6ddcae0e10f6ff3891c4b0d3de7645f2be6c3d7b4cabbb910edf769dd9140ad64df2ae952c258b1a9f43fb58cc5f91477f7b9bf6e4aaec28d2a138"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x6b) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="182000000000000045247248df533a4cbc9bd2b4253acd2d5a9637fa2e60c29d2de0dd80502e038c71f4b4126af0835658b16527d19fffe2bdf71559876aade6252f2bc923f192d0489fea40cb841b14483dcc7501fc"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000000)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000480)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000003c0)={0x3, {{0xa, 0x4e22, 0x80000000, @local={0xfe, 0x80, [], 0xaa}, 0xfff}}}, 0x88) r4 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r4, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r3, 0x0) getsockname$unix(r1, &(0x7f0000000300), &(0x7f0000000380)=0x6e) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000080)={0x9dc, 0x1, 0x0, 0x1000, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000280)={r7}, &(0x7f00000002c0)=0x8) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xfffffdfd) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 4 (fault-call:9 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xfffffdfd) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000480)=""/29, &(0x7f00000004c0)=0x1d) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cuse\x00', 0x1, 0x0) getsockname$netlink(r1, &(0x7f0000000680), &(0x7f00000006c0)=0xc) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x2bc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="97922388ef9c33c000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={0xffffffffffffffff, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xfffffdfd) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) socket$pptp(0x18, 0x1, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000008c0)={r0}) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x0) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, 0xffffff11) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={0xffffffffffffffff, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000700a208494307e242"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x0) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) ioctl$TIOCNXCL(r2, 0x540d) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x480, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000000095000000006abfaa"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x3f) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="0500000000000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000400300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000340)=[@in6={0xa, 0x4e22, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x1}, @in6={0xa, 0x4e22, 0x53c1, @local={0xfe, 0x80, [], 0xaa}, 0x4}, @in={0x2, 0x4e24, @multicast2=0xe0000002}], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={0xffffffffffffffff, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000980)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000fff800"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000340)) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_dccp_int(r3, 0x21, 0x1, &(0x7f0000000000), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000340)={r4, 0x3}, &(0x7f0000000380)=0xc) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000080)) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000280)=""/66, &(0x7f00000001c0)=0x42) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) getsockopt$inet_tcp_int(r4, 0x6, 0x13, &(0x7f0000000300), &(0x7f0000000340)=0x4) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x0) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = semget(0x0, 0x1, 0x10) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000400)=""/144) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e1d}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000380), &(0x7f00000004c0)=0xc) write(r0, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f00000003c0)='./file0\x00', r3}, 0xa) r4 = socket$kcm(0x29, 0xfffffffffffffffe, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000000)={0x6, 0x1, 0xe010000000000, 0x9, 0x800}, 0x14) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="030000000308000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000480)) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000095000064c084e30548b00ca76b590000000000b389796d8cca97bb143a34edc74e0d555cd1c4b5458bc18afeff32847e5889c092640d6420b600000fff2f018bf751e8613ea8badd72793658aa"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x20000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000340)={0xffffffff80000001, 0x8, 0x1, 'queue0\x00', 0x2}) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009524e994ec457d91"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) r4 = accept4(r3, &(0x7f0000000400)=@hci, &(0x7f0000000480)=0x80, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r1, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) pipe(&(0x7f00000004c0)) 2018/03/29 15:38:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:41 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x9, 0xa0a6, 0x800, 0x4, 0x7657}, 0x14) sync_file_range(r0, 0xf6, 0x6, 0x3) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f00000002c0), 0x1) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="5c6900614d37c1280003000048a242e7780704f8219c0cdad9b1aa000000da34d8c99ac0094d0872da83d5b114356487fa34658b1adc8623b3480edf3b632ee9985dd175"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x81, 0x40a00) recvmsg$kcm(r2, &(0x7f0000000d00)={&(0x7f00000008c0)=@hci, 0x80, &(0x7f0000000b80)=[{&(0x7f00000004c0)=""/17, 0x11}, {&(0x7f0000000940)=""/162, 0xa2}, {&(0x7f0000000a00)=""/80, 0x50}, {&(0x7f0000000a80)=""/127, 0x7f}, {&(0x7f0000000b00)=""/113, 0x71}], 0x5, &(0x7f0000000c00)=""/242, 0xf2, 0x4}, 0x40) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000d40)=0x633, 0x4) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000d80)={0x80000001, 0x5}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x200) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000340)={0xfffffffffffffffb, 0x28, [0x8, 0x0, 0x3a1a, 0x80, 0xee9f, 0xffffffffffffff61, 0x8001, 0xffff, 0xffffffff, 0xeb]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f0000000340)="1a067ac408796a3b13f56218e4c517f923a43895d9dbeaf4fff06fa5d2fe370b4b3ebeaa816fbd22616327bf043357e82cba9d1c0d775978652a817f5d2f2f4e2df3ec3c27d8d827209e5925bbf07f8a4366419f54276f5b848cc10dd3193607a3b3b378bb808f29d7d686a267779d681527a9b40b280aee9347de60a44fa41855e8f0d11759ac920bd0c9dea66cd7b5a1940370e4308f99e1dcd0b8f98aa28d7386f7e3431b73372891921487f379365dd995113a64b0972598cd97985bb57d") write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7bbe462a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546447af8a11c22111471c2681ba3ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaf", 0x10f) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500ecff00000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) sendmsg$inet_sctp(r3, &(0x7f00000005c0)={&(0x7f0000000000)=@in={0x2, 0x4e21}, 0x10, &(0x7f0000001740)=[{&(0x7f0000000340)="04225f059111dc3b893e9d14fe942cd20cd6ca719b8b0f805eebb8c45e1638054087e72a868fed0373abdc37a16451c96dc6fa7dadbdc876f912228a3b031b3053e417ea83b2a72da6b6b18cc30982f9aa69f196ab6da20d3e599ca48a9c3dd648575e89e5a7b60a127d9ce7509e99a426538e1e3b96e5a531ce4c69cb997776f03cf46302ec4e85a8ce711ebe090be14e036010ea340160d4def9f4f4aa2a4218d5007f3ffa7533181b4c892dd04b6656005b0db7d9011997b3923af66094cb637c7f196788db8f1b8c4aaaed60af59b092a8b582b502cfad035cbc6fcfe730479722d510e91ccfff1ffa46104534a1242d18", 0xf3}, {&(0x7f00000002c0)="0ea62217d7813c9e6934", 0xa}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="73b0cf9c5cd770eb0960ee38a98fba4c2d063201575bb2ab2a4c243e03195cfd633f59464f296ebc0ce28f80662e82c716d40723511f820ece0d5dd864a05696cb0ac47b9c9407c9b8c4a421269ad9313ec63647ba3f2a9edc95ff590159cd0950d5b9a6cf6e223ff8a6f1472b5d6588e7bd97564b41743368b02ebc30e0653d0b581530599209a23775f536b6b81af7628e00c5e13c00bac5b3680f6a0ecd1efa90c4127c36e9afd18a135967f8815ee9ef73634c922ac8a717bdabb3b3f377120a65f7986e66dda2f1cb8b6907a02b76bffd244e6e1fb2f8a93e02b045", 0xde}, {&(0x7f0000000440)="a498848f489c13131e537daebdd0abd0ffab89576ccd7088445c468ee7993cec", 0x20}, {&(0x7f0000000480)="a642034f3c895d16bc5c51e9b44d38cdedd2cbe584532b372bba13fbb609d2a78139084fd962df00316f7c87ff7df7702507a15768e1474c6878733c8446465a866b311f734d", 0x46}], 0x6, &(0x7f00000017c0)=[@init={0x18, 0x84, 0x0, {0x5, 0x7, 0x4, 0x73c0}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0xffffffffffffffff, 0x8001, 0x101, 0x5, 0x80000001, 0x3f, 0x8, r4}}, @sndinfo={0x20, 0x84, 0x2, {0x100000001, 0x8005, 0x1, 0x6, r4}}, @init={0x18, 0x84, 0x0, {0x6, 0x5, 0x2, 0x9}}], 0xc0, 0x20040091}, 0x40000) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) r6 = syz_open_dev$adsp(&(0x7f0000000480)='/dev/adsp#\x00', 0x81, 0x111601) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r6, 0x80dc5521, &(0x7f0000000840)=""/173) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) pause() ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$sock_netrom_TIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) write(r0, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000340)={r5, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x15}}}, &(0x7f0000000400)=0x84) 2018/03/29 15:38:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getsockname$packet(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000001c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2300, 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000340)=""/241, &(0x7f0000000440)=0xf1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r1, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) fdatasync(r3) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="1802000000000000000000000095000000000000000000001abbe3068fa05544fbf3f9bab15431df15e2c49ad5a07d3877d5b0ee49614db54d3eee06451c9c6ba720ce25605b22ec9bd913ba653f843ecdb4fb2adf9022bddc42bd3f051a2416a820aef261c372183a7f21470e4796c434b204006180e09747ea7adeb26469865c620659d8bfd051d472529303327d2396c96dc3e04741332778cffa86cdbd374b87ecf351bd"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000480), &(0x7f00000004c0)=0x4) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x80) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000440)="3fd1f9f3c6a73e1fb15059fe9ecb361d34b70e798b1c796da898b134d60ce228dbec6254d763360cc0407f077d2ca29957fd17b719d10b08b78da6fc1b755f4be7b16e9753d9c92f6925f61b681dca7d5c9a6f4d7264a764d9a6309458466662513fc4a7feb0491a508eecfb516f3fbe5adc267e23e870d34ccb5f630ccb6a6883aa746686cb381de37aa37b192c157ecbdd15c9ea8f8673044ee0783ac588f8f3875e", 0xa3) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) socketpair(0x10, 0x80000, 0x800, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000002c0)={r3, 0x5}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x4, 0xb7, &(0x7f0000000340)=""/183}, 0x48) r5 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000600)={r0, r4}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300), 0x4) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000480)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000004c0)=r5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 7 (fault-call:10 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 4: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x140) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000003c0)={0x10000, 0x8}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) mmap(&(0x7f000024f000/0x3000)=nil, 0x3000, 0x2000000, 0x32, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x1) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) close(r2) bind$bt_rfcomm(r0, &(0x7f0000000400)={0x1f, {0xffffffff, 0x4e51, 0x8, 0xb16, 0x0, 0x8}, 0x100000000}, 0xa) write(r1, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000300b745f6000000000000000000009500000000000000c9475d425a59131340c34bec326d05338e4e965323a9780de58396d20a639dcbda34e71ebbc961b8e2e1835e322cd9b27d1269a95a743c7c0000000000000000000000000000000000000000009306a929493ca56e496519738c248483970f7375daeebb5b3fc59dfb2004c8de0be0e70aed5287cb9bcc66b1ec6ed5305fd5caef3d7f6e755cdeed98fc1aa7d42a524e40105df7bcdf51"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) mknod(&(0x7f0000000440)='./file0\x00', 0xf39d1ca770f6ee4b, 0xb22) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r1, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000080)) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) getpeername$packet(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x400000000000, 0x0, [], r1}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000000380)={@empty, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, 0x0, 0x800, 0xf778, 0x400, 0x5, 0x100000, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000380)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x1000001a8) socketpair$inet6(0xa, 0x3, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000340)={@dev, @dev, 0x0}, &(0x7f00000003c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000400)={@empty, r2}, 0x14) write(r0, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) r5 = memfd_create(&(0x7f0000000440)='eth1\x00', 0x1) mkdirat(r5, &(0x7f0000000480)='./file0\x00', 0x10) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r3 = dup3(r1, r1, 0x80000) syz_kvm_setup_cpu$x86(r3, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000340)=[@text16={0x10, &(0x7f0000000000)="f4f30f586bbd0f322c9166b9df08000066b8db4f000066ba000000000f30660f6512bad104b000ee0f01c866b9800000c00f326635000400000f300f07", 0x3d}], 0x1, 0x20, &(0x7f0000000380)=[@dstype3={0x7, 0x9}, @efer={0x2, 0x1}], 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101000) bind$netlink(r0, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfc, 0x2000}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r1, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000340)=0x4) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000095000000000000000000002211fefff773de03f22906f3e2717b24785af7145c177bcacd6791de5bfc8a357ea423deaaa070f5f220b0e2dc444befe9ab0b7d6af938863da45951c97a90e9b5a01c071b08547f20dce1d97657cb5fbb09efa944a6046cfd8efe34ab2ecd66b5392b4b5036caedacffdbf077bc9cc21c32a81d0685426df37aa52858d2c9238277a965ae49652845c3c85d6ebb24703e3a0179521d52860a467830ab9216decea2fecb51d923ddd1f6ffdc28e400000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0xfffffffffffffe5d, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) prctl$void(0x1f) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) sendmsg$nl_generic(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xe4, 0x3b, 0x300, 0x70bd26, 0x25dfdbfd, {0x17}, [@typed={0xc, 0x45, @u64=0x8}, @generic="a9d45ec78b78bf5d511123876067fe1de5d4a0cff85c2c5c50056e32b8762605f05f5c9238dd73700e4098a11126ef789420439b1264ca5fb4004429fb8026255fc3c6c2c7c18bbab8f118e24832a609f163f6e3dbd792c5c50d2ed516a04387c6e09ce860efae218166b12b675cddf6501930bc74329794502d9ca9e0ec1062b0304d2d42975df22e75b4b16a2c92a11ede8ccb55dffab6cb33c708cdbff6fe9e4ffa088b6da2b01dbd49ba039a2d1e3dcd5008f3892b31c37e69ed0e132085e995ae"]}, 0xe4}, 0x1, 0x0, 0x0, 0x40001}, 0x24000000) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) getsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f00000003c0), &(0x7f0000000400)=0x4) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:42 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x0, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:42 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)="79610446000000000000000238df00", 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:42 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer2\x00', 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e20, 0x56b, @dev={0xfe, 0x80, [], 0xd}, 0x4}}, 0x7ff, 0x2, 0xa3eb, 0x9, 0x80000001}, &(0x7f0000000900)=0x98) sendmsg(r0, &(0x7f0000002400)={&(0x7f0000000b80)=@in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000c00)="50183b285c9b5470e0c83821b6c39f241bf6001bbbbc65c6b478234586d401cd8c30a38ed188cc9a56b3b85c7f2bfab0c3333c1b0d4f0ffdf4e197e2af2e3fb31ad3a59f83e38dc86c6ea4165a11ac76b7f399a1bd2a705ae9295423ee16f9d20e1ca5b45406b9cac10e2ec4b2e3", 0x6e}, {&(0x7f0000000c80)="59f1b11a25211d91ddcf8f25765620535f56cbdde197edbdfc78ca60ffcc564a12cfe8b8229dfafde0217eb3b9e50062b9a458af324db3a8771213f7f752b5bf7b128a3a9e5e79596eb9226da91f75a9957c8495723dbce26083fe848c334bf2b7e05bcd044d6aa6e550cb88579bfaa39f98dd8a9b73af0593169f57d2f231752030ddb790d6352a7ac7e689992782fb53e25b7efef80a299fc07424fb18e12e12345ef26f41107824704fcaaff5fdd1af0723d9a2d5a47a300e738acd8072d8e5186f33d2fa9c4ec7cd3d1f1b84c6b70acf69a0ddfc6792923aeb55735ae3824dc5f7", 0xe3}, {&(0x7f0000000d80)="43d50b9f40701b7790265d5a3644aee6b5ba89220cc28c4b91c39952df11", 0x1e}, {&(0x7f0000000dc0)="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", 0x1000}], 0x4, &(0x7f0000001e00)=[{0x18, 0x10f, 0x7, "3425f5f0ce7f2619"}, {0xf0, 0x116, 0x7, "5afd9395959d1e313738c1d51e0f5f9ad3bb4fe4ffc11610e56f991870fb1ac35aa3b1742b70cb073f2cdd1568b17d5d5173fe72ac51650febd9bfc435effab5cb3da0b5972a097404ab3f4f08cb0d462b1f9ed1eecfc43dd81b4fd60646a530a5da6255a46b885e612583a4cdbe10e7672e5619f5daa6b4be41725963686f56cbe51b9e6ccec944ff76f632a0ed28904182d23674385a8a1877309ab209129f74fa9357d870381300a7fc80ac9d49c9aa80fbc68ae5fc7d0992dacbc979f124123aa590bbb9ca2947e36b418273ef329c08608659c52dd47addf2b584"}, {0x30, 0x13f, 0x0, "217da8898a00f5108852a7316c50ac58f41b99a5c07181c7a6f9347bd1d7"}, {0x90, 0x63e962bcf62d52d1, 0x6, "3b9284b9ee2a46ebe7cfcc82d53e80fb48a6eae02f9c4356c71b91e9d82c66a81194bfc9ea40271e924f5f2e7be6e5d4490c74e0739556f34922e61d891b309be9b3f8b997857b9548f82e4e8a9b9d8ab3576d5297d744cb57b3100654918263983c68512172af08c5f8a11ad5cc10b336a4428d8d24ff2dc151"}, {0x78, 0x114, 0x7fff, "4f3b6e1a45843dcff8eec11b9440d6fd960b6f59da354af17e88d2510eaa1ab91d0b515ef2c14d1e3b20e925e00cd926149c6f8dd148fe9c6ad37a86baacb7d3adf49b6449d336ef20acae24f3f56dc0f105e57629025647493283caf21e2ca945c5bdb6"}, {0x78, 0x10a, 0x9, "0a5650a426ce05d8a3656506ca58d2f730155b664619b702641b0e221f6b86ef67a19e0412a99176862d7cffdeb7a528797b801e3fe7f0022d60e205fa6eb6a968325b9e495b4387392eaea200c95d7b1b4ee0f12dc2b4277ce4b11eb0cdb91aeb317a6da38af4e2"}, {0x100, 0x102, 0xfff, "af4740e61a0eb4b7c9bcf32e9f7b942f36db6086224a14194879621946901b4d5259ef28771c077333ae3a68202cdc12b358077c6071a3dca1e7be86586d5c26d39c52158a7f10ad4622f45aaf70cf9e5eeaca62465af0a33731fa8fd99e4d4b7f7705dfe49d2e1a3bd7a144cbba22ae064ee2c3f58a55092595e408af0b6c9e5aa30ef7159dfdea9e21a3bcddf3c6282af263077fa2a074f327a2c1fb729c311c6da0c029ebde0bf6c28323fc3f14819ce8ba08e99e6c7c947ce5995b6944945389cf999bf41259be989b50328a126c9e40bc8f7a8d2d56f38d4d15e816b8dfb39264f5e947aaaf7648f9fe"}, {0x50, 0x117, 0xa8da, "d4d95bc1598b59c064a1281e6ae4068aa46c7830050f5b7804e7e11d71ce88ee6866d556556dafe651c6faff1cc26f8d2703b1a346a3110e94a522a3cf97"}, {0x110, 0x117, 0x3, "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"}, {0xc8, 0x1, 0x8, "d892543105183d82ca954e6bdadacb5e53d197b47baa860e14db479d5e23d85aac5830c81eadecd20e187977351604ad2eedb47fcb3ad5af73af2b4ff36502a3f750b0d3caf0f2c998eb0ffb35b66e09e6a6acdd9ffbe087683d0dd59e67cb222236960aceffdd97b0b970f80c8e6c26211b211829d36ae00e3743c22080b514f9f262191057fb438e322ab4220d4b51e3fb6784daa93015959adbda7c2ffd408034875e4a956375574f67aef2b57a0728bc"}], 0x5e0, 0x80}, 0x4004) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000002480)=ANY=[@ANYRES32=r1, @ANYBLOB="d7000000d30176613514b1e37e501545f88f18c723993827a3aca080d0f4450e5b50999446d70a3fbd616fc903d2cfedb6e59a011d7b7b3ab3b852c5073cf913eaba093b8ffeaea61cdf34c94fe8b81ec7e5f7d400584c8b0f2ed463802d8ee9d03b41718d675b05ef08331791f636b7f54a6ef070e750179de90f30b9e0754153e28b6c4d93fff0e039bed5febd5e76bf126d826d9d544dc2c8b4bcee61970f71b8d2710487ec5df85b9bc0f4bf2dfd280a1f6aa27d8d0303ca1e75a9b9e84c89cb6a6a84fb8e33d553f19e8ea7050aefdc14484bd010b87a5863cb74a7709fb72fda7a29a1118da900789784a7823d"], &(0x7f0000000a40)=0xdf) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r2, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) getsockopt(r0, 0x3, 0xd515, &(0x7f0000000a80)=""/157, &(0x7f0000000b40)=0x9d) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000001056f1ff009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={r4}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000002440)={r5, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r2, r3}) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000480)) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x5, 0x4) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000340)=0x8) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000340)="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", 0xfe}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="7cb39e6b506e8515b80739096b37ce8a8c1ef47b0bcbc9b71812368b65b821c0474a5974769215dfa5511dc9edf4fdfc79676254678ecdbfb32ce0afca810865b9d4b0d16391adb72a1045d451d2d224eca52b8388ad5853290a078905d9d38ae9ec71570169b995217b3617289e8039f1a8ec15caf872f2604283bd96024199f9ca99400ed03c535f78aef79aa2747635bc2ead7769643009d7e09edade3113f77499353fce661a8427a8d733184575e41844a198511b220bbb19999c8b5569cc79383e7c713094d149fc92450fde1502792ba907668b406162547233e08deaeadd7cd41cee7a4ffa99ae54fd89532ee7d9b2833128", 0xf6}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="f95066c2ed7f60f57efcf3759991ac41fcef24706c7372987b4e298e2b44005f930dd2d207aa42e48eb1f488c47b8d33203830b4f4635a6f4b08d812be33db61a3dc8552578b7574db6cd505d74e1f468a99e416181ac7f90fe4f31ec09dc8fc9c21eef597ae631bb9f69179180dc7f1d8c636278dc21947fd5129106c91313c5b2bd7086561bd36cdcd0fe59feeb60e9de67f7bc2651978e16ef3af21ff621f0fd70a9bc2e021738afe82aea57280c3dbf9436fc764c53087a221533ee388fd09da5d1b109178f6f8d7bc084f43c8af1343e99745c4a368b82288a53362b447c3be86a219ae716d230cbb38e2d6e7a477933a5af38996d2b1", 0xf9}, {&(0x7f0000000000)="0b80148979cfbc47e0b5e2dd71e8216c350e530651707f281552da6adacd8287638142fc7a191e97", 0x28}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f00000002c0)="1eed9106", 0x4}], 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180043311bdb00000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000280)=0x9, 0xfffffffffffffe25) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) ioctl$sock_bt_bnep_BNEPCONNDEL(r5, 0x400442c9, &(0x7f0000000080)={0x4, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r1, r1}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xe70, 0x40) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000340)=0xfffffffffffff001, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1a000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000002c0)={r0}) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000340)=ANY=[@ANYRES32=r5, @ANYBLOB="05006827df58a061a475fca2152c5200855c5f851500b2447fa53dbc0e82c77c2d853c1335644d81bcced2bb77aebe2a49d6a291a6df87432f58394e718d8dc8dc141a7bf87eb00792fa0ae8b88c2efa8818cb4da9df"], 0x5a) ioctl$TIOCCONS(r2, 0x541d) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000030f2dacc68691d4329ec3122e861d8c5dd32320000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) getsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f00000004c0)={@loopback, @multicast2, @multicast2}, &(0x7f0000000840)=0xc) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) syz_open_dev$dspn(&(0x7f0000000880)='/dev/dsp#\x00', 0x4810feeb, 0x1f8bae8f3c9cebb2) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x0, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x0, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x0, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000340)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000640)=""/4096) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e1e, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @broadcast=0xffffffff}, 0x835d13fc12c68f23) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="190000000300000000000000000000000000c2eca4d3021839c8a511d6145b3946ed8442db053562cef67983098180e4c5a3a7f296257bada681094e1cd422f7476ba793d3077241a50d40614790fa866f2cae820d9e38aaf50a6156defec7abb3f0ecedf6e582db3a51534e7c1164c4310a7c311749961a427a9e69"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x1}, 0x48) r2 = dup2(r1, r0) openat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x10) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r4 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xffffffff, 0x20002) recvmsg$kcm(r3, &(0x7f0000001e40)={&(0x7f0000001d00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=""/127, 0x7f, 0x8}, 0x20) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000001e80)={@loopback={0x0, 0x1}, 0x1e, r5}) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x0, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vga_arbiter\x00', 0x20c200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000840)={r3, @in6={{0xa, 0x4e21, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x26}}}, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x0, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000002fffffffff60000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40800, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x2040) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000400)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, @in6={0xa, 0x4e20, 0x5, @empty, 0xffffffff9c1aede8}, @in6={0xa, 0x4e20, 0x9, @loopback={0x0, 0x1}}, @in6={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffff1fc5}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}], 0x94) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e1f, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x17b) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000280)) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800002c42182afb8b3e3848ddc06e000000000000000000000000109500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) pwrite64(r0, &(0x7f0000000280)="349a95967874424c5a27710b918c9343a36e745ca65247ea16471f703398e079af8c5a75a5f871aea41aca83e87795f5e4d3ae516a1c20793b9d373756e6b4f6c822d55fce5557b71af5fa9d0d90ce1381e7163db1d4cffc25dd5f8df88a05397c2ad198351e093c3e42906899b7b005dcd7b182f45dc1735916d72964aa3d2fd708418be29479a47594160c9e33c1baa3e0c8d25a1314b9d6747ead", 0x9c, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r3, 0x0) r4 = getpgid(0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000340)="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") ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000440)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) process_vm_readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/86, 0x56}], 0x1, &(0x7f0000000600)=[{&(0x7f0000000500)=""/249, 0xf9}], 0x1, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5c, 0x5, 0x3, 0x8, 0xffffffffffffff9c, 0x9}, 0x2c) r2 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x1f, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f0000000380)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r1}, @map={0x18, 0x7, 0x1, 0x0, r2}, @jmp={0x5, 0x10001, 0xc, 0x4, 0x4, 0xfffffff4, 0x1}, @exit={0x95}, @jmp={0x5, 0x7, 0xf, 0x3, 0x1, 0x20, 0xfffffffffffffffc}, @jmp={0x5, 0x800, 0xb, 0x1, 0x1, 0xfffffff8, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f8, 0x0, 0x0, 0x0, 0x8001}], &(0x7f0000000400)='GPL\x00', 0x1000, 0x4c, &(0x7f0000000440)=""/76, 0x40f00, 0x1}, 0x48) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000540)=0x2, &(0x7f0000000580)=0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ftruncate(r0, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x0, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0)=0xfff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) accept4$nfc_llcp(r3, &(0x7f0000000340), &(0x7f0000000000)=0x60, 0x0) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800040003000000b997b62cd92732743e9220ddfe0000000000002000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0x1, 0x28, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={r3, 0x100000001, 0x8}, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) sendto$inet(r0, &(0x7f0000000400)="498de7333f625de4f517774188667211ee65ac98e242af990441cd8f8292c8f4c84a2a7ce488b89e8a46d320ee65c30bcd1f2d24d611d143cdbf22c7e17b35e71fa00ef2e4d11a7c61af369eaf267bb674fe61eb4f98b4d1b481b1386788c6fa80fadf341f74956f34df392270423ad665156ccf2e2863aeb1d2b481534d817e0d0b5d5c4f36599a404eb88689a0f4efbb1193fbf58193ab9a2c4cb0a8356d7d0f255f217d47ebf440215df6fb74b388eac97cfdf29484f38b4eb6277b7cd303fc0e1c447cfc44398d6af6f90d38221587a0255cb88f5539ea1dd085f30b34b672d57d487745001f5021ed8db1e6cd220e85ffda3ab737d3e009b7c3f0", 0xfd, 0x20000000, &(0x7f0000000280)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0xffffffffffffff9b) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) setns(r0, 0x40000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x6, 0x1c9000) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000002c0)={0x53, 0x101, 0xd218, {0x2, 0x3}, {0xc5, 0x3}, @const={0x81, {0xbc4, 0x7, 0xb32d, 0x4}}}) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000090129500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r2, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x0, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000003bce0a25465277b500000c92db5516b1bd792f2317f2e4819758546253b9a5c0cf31d888a6e447a75dbce318452dab3e8419dd67cd01ef590dd304d952"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x0, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000840)={0x0, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}}, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r1, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @multicast1=0xe0000001}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x1c, {0x2, 0x4e24, @multicast1=0xe0000001}, 'vlan0\x00'}) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x1, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f00000004c0)=0x8, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000280)="66b9f70900000f320f09baf80c66b890f3b98666efbafc0cedd32a0f01c8ba2100b80000ef0fc7aff747650f07baf80c66b800c0048f66efbafc0c66ed260ffce7", 0x41}], 0x1, 0x40, &(0x7f00000001c0)=[@cstype3={0x5, 0xc}, @flags={0x3, 0x10}], 0x2) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x7, 0x40) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x14, 0xa, 0x400, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x3}, [@typed={0x14, 0x101, @ipv6=@mcast2={0xff, 0x2, [], 0x1}}, @typed={0xc, 0x3c, @u64}, @typed={0x8, 0x30, @uid=r3}, @typed={0xc, 0x67, @u64=0x4}, @generic, @nested={0xc, 0x2c, [@typed={0x8, 0x67, @ipv4=@dev={0xac, 0x14, 0x14, 0x16}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000001) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r1}) bind(r2, &(0x7f0000000840)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x2, 0x1, {0xa, 0x4e24, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0x7fff}}}, 0x80) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500080000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000500)="15ea7114e12e8855f1bfa41aa59ba17c3e346c260b016df4c0632ea811c847c94e04948e169c17161f563aa036e989c67c2ef1d90f3e3d3760dfdea27e9ff9d54ee694c5fd205626921862c7495c96d49c12451ae910d4878e0ee3d69bbd7d562046b72f3eb97638597b4795370bac6ed91af483726dc648bad9749957729c13eccb633a0e22d492d1448fb4e9085f341a3776d0a40507af13504baa8edb34607fe80924e80711f9cb9f8a5ce97fd8ad963a5efed30091f62793018758175dc9da9ff816c7eaf6db63e476472a5022e979b1f97c980f662c0eb2d6b2cde3116b3d8cdcbfd866605f6809ea73959177fafa", 0xf1}, {&(0x7f0000000840)="b4b9b6af9e5b590f71802de5bc769af7698fac3f48de8572b52abd5d0adbb26eb58ffd915a681ea13cf719669512340cf1803a10d256a3fe816f3fba0fb25c91a005fab3367f8d9af4246b371c22aa9cfc7a3ae0f1df72a0bdbc2b38e602293b58565a04dea797365d4369e13beb893329b858dd2c8080add6a01c943de98f0d3258c726e6a5d7a4ab1e234d2327df492909e6dd8886bf28a5bd43a77f305f2a608e5fdb9053080a339128ee24799f919c8152fbaf2eaf2e67d24c76a1ef7cb2830800838e9c341e9cb3b1", 0xcb}, {&(0x7f0000000940)="cfcaf4fe03aa3052600840c571c07228aeb6f2db43a81a730ec775cd227d43e430af1f49652ff8ea4cf630b05be014c9ffbe29f7d6c09276a1b856bb12a9ac95433aa1bb74abc0a1aa1677f0da76fc75a01fa378c4b2e17987eb6cc2fa9e1b1d141dea3447c39f7dcd703b3fe56789270a3cd680a32719c76c2605a8fa958e2b1f865e5fcedbd4c5ca9c85c778259c794303cc9455d18cfd2259865daaf21d4dd1733e1d87deaff69e4bb1dcf8e5e51f6f57af3e2b264d9e8fae29be9fe8e6e2427e1d24cf70dd453ddf78db94a8e9ca5218b85967461d3d686562a745b618f665c5242780e5856ea9b6cf548f27fd8a36bfb97aac56", 0xf6}, {&(0x7f0000000a40)="bd1186c92450a297e8a7abf13c7f39dc0ae4c955a7601f8410c44e676cc9f3eb2bd4a297380ed35ff412f101fd183aecb89d7b5fd682b15d1ba67fc34e6ddf0b3b98a1be8c8f4094b208e212ffe7b95d152c143f3bea5742d0a13974bc06a1e835ac9dcf07383fd71498356a63ba8d455dfd3397121d8794ce0d9a8243aef0ae30a4220922f7d2c6b3", 0x89}], 0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000950000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000b00)='cdg\x00', 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000440)={r3, 0x9, 0x7fc}, &(0x7f0000000480)=0x8) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f00000004c0)={0xfffffffffffffff9, 0x5, 0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'bcsf0\x00'}) 2018/03/29 15:38:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000a40)="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", 0x10b) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) llistxattr(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=""/147, 0x93) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0x4e21}, 0xfffffffffffffc89) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x0, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="000000000300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getrusage(0xffffffffffffffff, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000080)=""/22, 0x16}, {&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000001c0)=""/224, 0xe0}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000380)=""/71, 0x47}, {&(0x7f0000000400)}], 0x6) r2 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x7, 0x80000) setsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f0000000440)=0x8, 0x4) sendto$llc(r1, &(0x7f0000001240), 0x0, 0x0, &(0x7f00000012c0)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) fanotify_init(0x69, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:43 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x0, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000030000000000000000c58b783bc602edea000000bb4e59fa660b11123a4599a147127e46d8c69c3bbc3b746d70f1831bf50d9dcf4d887062f658698b"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000340)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) read(r2, &(0x7f0000000640)=""/4096, 0x1000) r3 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xff, 0x500) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x0, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000000000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0xffffffffffffffff, 0x3, 0x800, 0x80, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000480)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000004c0)={0x0, 0x0, 0x3}) r6 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f00000005c0)={r5, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r7, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) syz_open_dev$sg(&(0x7f0000000480)='/dev/sg#\x00', 0x401, 0x10001) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000030000000000000000000000950b000000000080b11b08fdf8ff4029ce1a193918154088a8f65e7af8547c4930783bf8a4428d2f98fe5af8983ed41f231e82a65dd3d7d49d46ccc40c75ee1432934838fcaf09231ed37d9d1a20a11d7b8184c42d05e01413bd7163e81369e972d38a825a0a6ae826e6b88d"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x840, 0x9) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000440)={r0, 0x800}) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x0, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) rt_sigaction(0xd, &(0x7f0000000000)={0x401, {0x7fff}, 0x4, 0x4}, &(0x7f00000002c0), 0x8, &(0x7f0000000340)) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000380)=0x17, &(0x7f00000003c0)=0x2) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = dup2(r0, r0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0x6, 0x2}, 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="ebd7e689ca8e3408f84de745a29e21ab342e7d9800000000000095bb0ca43e1fb4f6d740ac34dc2b4486191ef65c44d6a02f1a647353b44f5222a428bd1620183c418dc193900a41fc5e166a000e5cc2b8eaac8f27ce847d1e44046d35434c9350ec91960d10bf730aa18a6115cca6fc9446be3e861eec864961d59d85152579"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) getdents64(r1, &(0x7f00000003c0)=""/24, 0x18) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000080)=0x80, 0x4) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000280)=""/21, &(0x7f00000002c0)=0x15) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r3, 0x0) r6 = getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r7 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r7, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) setns(r4, 0x4c000000) fcntl$lock(r0, 0x5, &(0x7f00000001c0)={0x1, 0x7, 0x7, 0x81, r6}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet(0x2, 0x80003, 0x9) prctl$void(0x22) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r1, 0x4) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x0, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000480)=0xe8) getsockname$packet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000940)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x77, &(0x7f0000000040)=""/183, 0x0, 0x0, [], r1}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) ioctl$sock_netdev_private(r3, 0x89f0, &(0x7f0000000980)="17cece78275db67eacf31db72e7ccc3b510ccb04deddb1c82829353b823781a5ca0874f70d8e077ebf76cfad3ef0ebb72b8fb73d37e31639b0751a26f7cf4181ac5cb3fa86fadea51bbef99b83fa884533674767682862f2d0ea167686203c4607d462c193493245e900aed1df") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x90800, 0x0) getpeername$netlink(r2, &(0x7f00000002c0), &(0x7f0000000340)=0xc) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000340)={0x5, {{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) socket$inet6(0xa, 0xb, 0x80000001) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x2, 0x80) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r1, r2}) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000940)) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000840)=""/223) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x0, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000010070000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f00000002c0)=""/57) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x0, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x1b, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000eaeca3c279f68ecb9994c7f47e56b6949398fb26c3c5ff2ea2089b2b1ebaad590f0b87a56d9058159a46310e35763679bf7a044da635b813b498647f992a7b5c98fdc92ddc7509d8a0d8f4aab737f2a8f16c9ef83a8c3e51019cd18503f5834f1a79eb8ebbba49d2ee396aa1ffbc3442f4498bf1f152a066bae64216dfe026af7a99d0c694b230566bc7ecfd8496c48bdb9d7864a4747af9af593e95f0ab1738bfcd0a3f4de82abd0000000000dfb9e8fea2f1676eb94bfcd4d1be7ebf51bafdaa"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000840)=""/183, 0x2}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r4 = semget(0x0, 0x1, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0x2, 0x800}], 0x1) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e24}, 0x6) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = dup(r0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x2}) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000340)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009520000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800005c51cff0bdb20139f82faf482dcb390cd559123600000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_GET_DEVICE_ATTR(r3, 0x4018aee2, &(0x7f0000000340)={0x0, 0x4, 0xb55c}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000440)={r0}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc\x00', 0x100, 0x0) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000001, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x20102) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000340)={{0xfffffffffffffffd, 0xe115}, {0x6, 0x6}, 0x100, 0x4, 0x5}) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) r6 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x40, 0x29) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0505405, &(0x7f0000000840)={{0x0, 0x0, 0xffffffff, 0x3, 0x3}, 0x5f7c, 0x200, 0x8000000}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000004c0)={0x84, @loopback=0x7f000001, 0x4e21, 0x2, 'ovf\x00', 0x14, 0x9, 0x4a}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000030000000000000400a91d63d8000000950000000000000071914c6ae73a8832a1d8c6b31e5fc3b1a56d9148d4d4461fe00d2bcb73db68efdeba28d78f554e664d969c29d774fc1262b564bf54d1e465d221bcc9e71b672116ec9c686a9f89876a28d7ccf31fb16cb81e8168"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)="8e2b0b8404341bb6e6ec4e00f800", 0x10) fcntl$setlease(r0, 0x400, 0x3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) r3 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x6, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000440)=@req3={0x5, 0xf633, 0x1, 0xfffffffffffffff9, 0x3, 0x3, 0x10001}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setgid(r4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000400)) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000002c0)=0x1) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000480)={r0}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180800ff0200000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket(0x2, 0x4, 0x6) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000002c0)={0x0, 0x2}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000380)={r3, 0xfffffffffffffffb}, &(0x7f00000003c0)=0x8) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000020c0)={0x0, @multicast1, @multicast1}, &(0x7f0000002100)=0xc) clock_gettime(0x0, &(0x7f0000002180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000021c0)={0x0, 0x0}) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r8, 0xc4c85513, &(0x7f0000000640)={{0x4868, 0x6, 0x2, 0x3, "6e72dd8b773d1e309c26ddee963023ffd903acc7debdca64a2949cd3d987d3d68c959a167eaf39d03e09ce81", 0x1ff}, 0x4, [0xfffffffffffffffd, 0x3, 0x4b9b, 0x9, 0x0, 0x7f, 0x6, 0x6, 0x8, 0x7, 0x4b, 0x7, 0x9, 0x7, 0x80000001, 0x8001, 0x8001, 0x1, 0x5, 0x6, 0x0, 0x9, 0x8, 0x3, 0x8, 0x3, 0x80000001, 0xffff, 0x5, 0xb44, 0x40000, 0x2, 0x401, 0x1, 0x2, 0xfffffffffffff800, 0x8, 0x3, 0x0, 0x9a, 0x7, 0x9, 0x3f, 0x40, 0xffffffffffffffaf, 0x1f, 0x6, 0x77, 0x5, 0x7, 0xffffffffffff8000, 0xb604, 0x2, 0xfffffffffffffc00, 0x8c16, 0xcd47, 0x7, 0x2, 0x3, 0x8, 0x800, 0x0, 0x54, 0x9, 0xc0bc, 0x4, 0x5, 0x8, 0x1ff, 0x7, 0x3, 0x9, 0x9, 0x6, 0x7, 0x40, 0x7fffffff, 0x800, 0x7, 0x9dd, 0x85a6, 0x3ff, 0x8, 0x8, 0xfffffffffffffa36, 0x4, 0x800, 0x7, 0x95c, 0x9, 0x0, 0x6, 0x98ad, 0x8, 0x20, 0x8, 0x7b, 0x3, 0x9, 0xfffffffffffffffa, 0x6, 0x200, 0xf2, 0x7, 0x100000001, 0x11, 0x7, 0x0, 0x7, 0x8, 0x101, 0xffff, 0x7, 0x2, 0x4, 0x100000001, 0x2, 0x81, 0x400, 0x0, 0x3, 0xffffffffffffffe0, 0x8b, 0x5, 0x3f, 0x5, 0x7, 0xb483], {r9, r10+10000000}}) sendmsg$can_bcm(r2, &(0x7f00000022c0)={&(0x7f0000002140)={0x1d, r3}, 0x10, &(0x7f0000002280)={&(0x7f0000002200)={0x4, 0x20, 0x79a, {r4, r5/1000+10000}, {r6, r7/1000+30000}, {0x3, 0x0, 0x80000000}, 0x1, @canfd={{0x3, 0x80000000, 0x100, 0x1000}, 0x19, 0x2, 0x0, 0x0, "5181585198c2b96a3a5acc33606df5d1b3b7a9925bd4add477f0f3faf0f4256913151fb3d09a4aba20548effdc67174b96e4d4e855d36edf8e1106211b06f586"}}, 0x80}, 0x1, 0x0, 0x0, 0x11}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0xac0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={0x0, 0x82}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000440)={r4, 0xe35}, &(0x7f0000000480)=0x8) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) syz_open_procfs(r5, &(0x7f0000000500)='smaps\x00') ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000005c0)=""/23, &(0x7f0000000780)=0x17) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003008b1400000000000000009500000000000708"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) sendto$unix(r3, &(0x7f0000000340)="77e9db4f962ece704dbb86c4f3c5586f540a4d9be1282716c79f0d99ce7b96b3067547ad6185c50de5d8f2b74f84f26faf1b8e7215ac137e6de093c89f6054ed85740ad013ea86d95ceeb0f700bfdb27c111868f9a31b02261f15747b3e16784ec4d7db4b23d4f8479c9c1b8f8e3bec4b539d24a186a06c33e8559403682946cd3516626e2ea2f3871dcda2fb0176031cbce0b02c05f086c03b6d41b096a6dd6db834de318fa0ea718cefeb1f2214641f5ac3c41231c5b98a938d78afc447c1453c8ccfbfb7615275471f39183dbacecd443239632c7", 0xd6, 0x8080, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f00000006c0)=0x7, 0x4) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000)) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000640)={&(0x7f0000000700)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0004ff0f2300fddbdf250100000008000600070000001c00030008000800ff000000082611001400fdac000008000100000000000800040081000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000840) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = creat(&(0x7f00000004c0)='./file0\x00', 0x4) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000880)={0x3, &(0x7f0000000840)=[0x1000, 0x1000, 0x8]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000000000950000006d4f380b"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f00000008c0), &(0x7f0000000900)=0x4) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) socket$unix(0x1, 0x1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000480)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_netdev_private(r1, 0x89f1, &(0x7f0000000280)="f0ce6a2a6d961059deadfe3a92cb6f380efac6e945f0bab99d3c51b7222fc8e6616681707d561fb3fb0f96335bac9b5d87908c176664443f6e1e567dd8702787f2831838a492a47035d81b467510f49248c74a33208cda6b1062bc632f40f1d43fdf6019e06e8e3d68fe5380ef6b3beeba4d096dabb38b4a24547e114fce1d024f59b3c5b25eb5c9139cb985a326267d5eec6d97461023f05360ee68179ae44c6b877541b49eca49ec1cbd0fa91acddc") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x41fffe, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) getpgid(0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r7 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r7, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x8003, 0x5, 0x2, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000340)={r8, 0x5f, "dc1b08a460705cabc1e3113b03de69b5bb61d4844368e11243505567c3f41655cbb0c494290fb6f1c3c1ad78a2f8180e6b81dc0c29d4d0a42a1673bfae7f32f89013084aac70617e3ee58dbc9f01d734387e14130d8378db00a77c6d0175fc"}, &(0x7f00000003c0)=0x67) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r9 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r9, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0xffffffffffff, 0x0) socketpair$inet6(0xa, 0x5, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000340)=""/227, &(0x7f0000000440)=0xe3) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000002c0), &(0x7f00000003c0)=0x4) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003a60b86c234500000000000400000001c5c"], &(0x7f00002bf000)='syzkaller\x00', 0x3, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000001000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) r3 = dup(r1) ioctl$VT_DISALLOCATE(r3, 0x5608) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'ifb0\x00'}}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) memfd_create(&(0x7f0000000280)='yam0\x00', 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000503ac00eb2bf0e2cd02a030000000000fa000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x0, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:44 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000ea33646076067c1cdfe4f0636d95f497792bc95ce0844a6a43eff0001c34f389640ec431d01f35a22fce0b12085d9a62873dab34f7bcfc0415a0cf9ce5b0fe309f7e662e20c3b8600d40b58422ba47e7a41ff0524c224b8a35b59af0232df13be7a364cfcf353829f6a187c000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000400)={0x7, 0x70, 0x74b, 0xe3, 0x20}, 0x14) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt(r1, 0x6, 0x95b, &(0x7f0000000000)=""/55, &(0x7f00000002c0)=0x37) write(r0, &(0x7f0000000780)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000209500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000380)={0x0, 0x7984, 0x7fffffff, &(0x7f0000000340)}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) lseek(r3, 0x0, 0x5) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) connect$inet(r4, &(0x7f00000003c0)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) 2018/03/29 15:38:44 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x4000, 0x901, &(0x7f0000ff9000/0x4000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000280)={0x0, {{0xa, 0x4e21, 0x535, @local={0xfe, 0x80, [], 0xaa}, 0x6}}}, 0x88) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet(0x2, 0x80003, 0x9) bind(r2, &(0x7f0000000340)=@vsock={0x28, 0x0, 0xffffffff, @reserved=0x1}, 0x80) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) dup(r0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:44 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000400)={0x1, {0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e21, @rand_addr=0x9}, {0x2, 0x4e23, @multicast2=0xe0000002}, 0x20, 0x9a, 0x9, 0x1, 0x584, &(0x7f0000000280)='rose0\x00', 0x910, 0x7, 0x19f4}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x0, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r4, &(0x7f00000002c0)=0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000043000000000000000000000000781f746b510000bb521432f072cce36fc05620b162c6aa1d4f9bdd4da2104d5876e8572d16e3d799829453f186e3f329385c3acab00e591ff47e4e60b5dcae1e74ec4d1997e0fcfac885aa3c965913940e2baf118a0834ff8bcaf6ae4a8c9c8dba82d4f2899990c7bca0e2e5550adffafe42f52c40b15dee40"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x10402, 0x3, 0x800, 0x200000000000000}, &(0x7f0000000480)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0xb3f7, 0x420000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000700)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000840)=0xe8) fstat(r2, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f0000000a00)={&(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfc, 0x20180004}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000003c0)={0xe8, 0x13, 0x0, 0x70bd26, 0x25dfdbfb, "", [@generic="2ef0bef45e2854dc316e27d544948d9af719c8267c3ad39554b93779d948eba0bc73552bc6e0677d462d6b88726c51a9a07b24ef72fb1177231fa264bec939a0dfb63ff21af386792cff798a464847de512b7d7783b31380c7a9006993e63d0c9ce6b7386198b9e5d469c849d76cb6250b4ea30ae60b81216081c85cc42c4bea7a7212c69a8eff6c342cff63daa3b6e090d2a96b7aba0b8b3c707f3a316e6d1985ebe570e5e3ad7789ef2217172577020cd4700de7ff89cab66b4f22b5418af50967020df03f54b94013310fd36d60f1bc652ededab00f"]}, 0xe8}], 0x1, &(0x7f0000000900)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x38, 0x1, 0x1, [r1, r2, r2, r2, r0, r2, r2, r2, r1, r0]}, @rights={0x20, 0x1, 0x1, [r2, r2, r2, r0]}, @rights={0x20, 0x1, 0x1, [r1, r2, r1, r2]}, @rights={0x30, 0x1, 0x1, [r1, r1, r0, r1, r0, r0, r0, r2]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}], 0xe8, 0x20000004}, 0x1) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e23}}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x0, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) r3 = fcntl$dupfd(r2, 0x406, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000001c00)={0x0, 0x38, &(0x7f0000001bc0)=[@in6={0xa, 0x4e21, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0x5}, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x9}]}, &(0x7f0000001c40)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000001c80)={r4, 0x1}, &(0x7f0000001cc0)=0x8) r5 = dup3(r1, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r5, 0x80605414, &(0x7f0000000280)=""/3) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) r6 = accept4$packet(r5, &(0x7f00000002c0), &(0x7f0000000400)=0x14, 0x800) flistxattr(r6, &(0x7f0000000440), 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x0, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) sendto$unix(r1, &(0x7f0000000400)="125bd1c61b4004d6d577229fa158516cbfbbbda8d11f6705a6861000547c1f0dc6057066c16eaa0d2a296545daffd74cbab9bd0fb0ef5c3f7bce477e98b1dd91d1f09aea9e2349c7b0f56d3affd5ecfe364e8ea7a0e7d219035cdcadc93de68ab996b6", 0x63, 0x40004, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000003000095000000e4e69e0aab08a00000000000000000000000000000002a5869db2f5f380f7b16e2247b0defa2501cb1a53f860cb46f4a231292d42d0153be58d82e9206ef4e025c16d3db933ce6a64fda4446a61786cb482059804fd970db18d62b373e409c51a6ed7dcba6ab5131ee1032c99d5a5ce282de3ebf3e000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) getsockopt$inet6_dccp_buf(r3, 0x21, 0x80, &(0x7f0000000640)=""/190, &(0x7f00000002c0)=0xbe) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba44") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x9, 0x25f, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000fae382d31846093d4f4f868b3e00"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180095000000000000000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x0, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000000296d0000000000000095000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba44") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fanotify_mark(r5, 0x8, 0x20000, r5, &(0x7f0000000080)='./file0\x00') getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'vcan0\x00', 0xffffffffffff0001}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300040000000064bd4571f77dd97d5734000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='yam0\x00', 0x6) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000400)=0x4) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x0, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) socket$kcm(0x29, 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000480)={'nat\x00'}, &(0x7f0000000380)=0x78) r1 = memfd_create(&(0x7f0000000580)='\\vboxnet1!\x00', 0x2) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x6, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={0x0, 0x401}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r5, 0xffffffffffffffff, 0x0, 0x800}, &(0x7f0000000440)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400100, 0x0) ioctl$KDDISABIO(r6, 0x4b37) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0xffffffffffffff5a) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000340)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000080)={0x8}) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio\x00', 0x40000, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000840)) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r3}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={r4, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba44") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x20000000000000da, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003008a60000000000000000000004f0000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) socketpair$inet6(0xa, 0x80004, 0x1000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000340)=0x5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9371, 0x80802) ioctl$KDGETLED(r1, 0x4b31, &(0x7f00000002c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfff, 0x4) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xfffffffffffffe74) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000009500001000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x60200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000002c0)={0x5, 0x0, 0x10001, 0x3}) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f0000000400)={r4, 0x2}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f00000008c0)={0x2, 0x4e23, @multicast1=0xe0000001}, 0x434) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="1f000000c1b2c50b07c9030000000000000003000095000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f00000004c0)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) r5 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x9, 0x40000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000840)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000880)={r6, 0x0, r0}) r7 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f0000000400)={0x80}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r8, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x188) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x200100, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x100, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000005c0)=0xe, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r2, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000400300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e23, @rand_addr=0x3f}}) close(r1) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000340)=@get={0x1, &(0x7f0000000000), 0x5}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) r2 = gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = dup3(0xffffffffffffffff, r4, 0x0) r7 = getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r8 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r8, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f00000000c0)) r9 = msgget(0x1, 0x10) fstat(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getegid() getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r13 = getegid() msgctl$IPC_SET(r9, 0x1, &(0x7f0000000300)={{0x10000, r10, r11, r12, r13, 0x8, 0xb38976b}, 0xce, 0x463, 0x3, 0x2, 0x2, 0x10000, r2, r7}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r14 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r14, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000780)="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", 0xfdd8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800ac36030000405b1f95000000e8ff0600feff00000000d8dc93c33c464b62d86917b3cfb107e84cf6d32781590baecd787a8fe980621abb1e3bb9e525fe31713aa2373123e97eef11e7e90be57ba718a0a4dba02f185590d6b509593655482e0d5bd502621d44ef7f52e4579b8b359044269a0c694c3e62ffc33cbc0a7761847d73dde58712dea7cec9b38dfe8f9c30c13cd3762c2505002a7d8cf947c42dcf6241"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xffffffbb, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x6) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r4, &(0x7f0000000340)="984ae309d7bf100465b97205023fcfc6e203c67c06806530a9f5ab6a548ee9ed1cf7b7789597106329f3a7f5ce483e73589072c49f27109151618e7eb27ad0e95470624805307788a43bace76a0abac9defc2b8b794253fe82e0f4857b0053741475722ca027c5d3740b4886fb0771a2e2399bbf05c69089ce26dad4f7ababe07e35e8bc0b", &(0x7f0000000400)=""/146}, 0x18) sendto(r0, &(0x7f0000000640)="ad81b6a0f09a7ed2ab11b2710d6a479a08806f5d5954ba523375966216fdb53fd513d4d5487279602494af4ce06c16366680d294f536b3a1f9b8c86d284fe7a3daaeff2bc156fa22463427b82152924c3aea7624be88f3899cc00158f88f231d8ac22388abce79b12132388f618506c59ef428e7461c93dbc0deac1a9959187b10671e057b7c675286fdb4626e449e01ad", 0x91, 0x1, &(0x7f0000000700)=@ax25={0x3, {"5fe1fd3567998c"}, 0x4}, 0x80) r5 = dup(r3) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000280)=0x1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000180)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000280)={0x6, 0x6, 0x1, 0xfffffffffffffffc, 0x9, 0x20}) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r3, r1}) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000400)=""/212, &(0x7f0000000280)=0xd4) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000ff000000000000000000000000000200"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) sendto$inet(r4, &(0x7f0000000840)="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", 0x1000, 0x4000, &(0x7f00000003c0)={0x2, 0x4e21, @multicast2=0xe0000002}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000004c0)={0x101ff, 0x1, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='ext4\x00', 0x2200000, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e02") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) [ 252.113696] IPVS: length: 212 != 8 [ 252.150563] IPVS: length: 212 != 8 2018/03/29 15:38:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:45 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000400)={0xffffffffffffaff6, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x88) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0x7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, "706f7274310000000000000000000000000000000000001000", 0xc7}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x1, 0x0) close(r2) ioctl$int_out(r2, 0x4, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r4 = memfd_create(&(0x7f0000000300)="766d6e6574313a76626f786e6574312e215d2c766d6e6574300054179ebfaf29b8b32435be9b082a2e67f0e229629ac3d1933dbcd76a4b903e0baa2073bb6d0a4b21e30f1682687211eb2716df623f4f84eb87d0c0606f6d5b06734c45d10948d8279464c18a5babb14021f2a5239f9cabcd2438ebe370326f490e55c6a9f934295c5a07", 0x2) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = dup3(0xffffffffffffffff, r5, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r7 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r7, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r6, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x80003, 0x9) 2018/03/29 15:38:45 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e24, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) sendmsg(r0, &(0x7f0000001000)={&(0x7f0000000480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000840)="bd77e48fd506f2cf636f44738b58804c7f97fbcd2a44e371da46175f260ab0051f96d5643e0ca29e08355b813b8bada526e7ef5981a84b771cacacacf553e5566c3ebf3ae3d3e669864c100866028f7110980db9bc5621599fe58ddeec34833f1ab80d65209064fe1a5a8438fef4012e2e611578b7f999c1e76733465d69532cac3410dc53273b20071c77cdc24aba4430d484ca452c391c267d52d3643406", 0x9f}, {&(0x7f0000000900)="5f6b525ebba6f3045e4596b4b3082b439f4ed209c36104434ddb6fbe349706180e0429fbf27e2461d78b29fc34991ff45f09aa18", 0x34}, {&(0x7f0000000940)="994690940634b14aa226f8a9a7e7239ee52020087774354e62643fb8d0705b758fbbcbd7a37b4dfa774fae62df720434a49f4b16", 0x34}, {&(0x7f0000000980)="6487751b1732fe28e50eb69064289b5a28c0cd5df832ca20113008472b43cdd3780de0546208ade598d61657166ecca2767e", 0x32}, {&(0x7f00000009c0)="7bddc0ddbb13555bbec91e0571e9b0797fc60d8f4f4fc6b81e6988ee15a6dee3cc302e991b6aab915c6f8ab83e546eac6e9d300a8aa3a85b1308c44559a2409ac94ada0dba6dcb5d5c060dbf5976797a6f1b864c44ae7fbb4ca5f1cada32cf1314e393bc3df82c82f33efefb1684816dad85279c2128ecb4bc2faba6e5d1a5464ff7bdd774279b969004b725f34de2232fd16dfe2c963f95c500dfd5625bc6d6f18abdf6ac1dd49fc1e6444cbeee0c2c20b7e70cb3392374f695c0ee4a4752add73a385456a1b8cc6016e02bbca946edd09abb61d1a4133205e66fcfec5be0d5c4", 0xe1}, {&(0x7f0000000ac0)="2c1a6acbdffcb0f512788bc21947b5dd290a649a4e6be347a82af2f4f4d52725e536029513da07c2d8b38366f8d6044243ea803c2611b206ec4910a6275d0f9c14811eb336fc92f5e16f612676de995b727c8c45f2a8bc95946844730481d3db3dac29abddb695434ff2fec8278922cc82583289770909fb61a5afe2b83aaafe5a33ae34cbcb540cf35a4c436720cea0e9de97971210d22b327f559f3a7b12a6b70120424638f52e9fa713ff075bc7aeb771360f03c9d762207920fa16340b25953a4c9d5b0d93c32a90a68c9b5bbbd0ea30c84452f2954b7853f5226b977316a2b2a63e82ba8d4974f6758bf1fbaa43fcb55ae506a7cfd4", 0xf8}, {&(0x7f0000000bc0)="c3c254f1f995aee0f505ebbd2ee2a3680b503fdf6e190861b3b15b7302e4a75d1bb2bbc3ee9c00c7f084bb56e2577df78d5734aca698805ac6bd61eb7e830fd32bd2145bb57647778e1f883ce0e56b74be2bbe595c37812237af175e98ed1da23dbf1ea8a9ba6da385d4703676900ea24898d60d2fb87413c380c24b8237b9ce1bdf44044a008796ad8d4741270e6d4a5529627e47394ea9f96753355443219a382f10984f67bb548a28f4819a8a6986ed010ed7ab1d305aa97b564efd3a8741e8ae", 0xc2}, {&(0x7f0000000cc0)="35d569243d936b09d797bb96f29a6931bb586944b908ea00fe5d9d5c5fbaa17eee780de25d4b3790f09162fdd563cff1be0f38ca9e5bfab265332f469cbcdae9b882b82451f1750b5ff5c862a4e6f1265f", 0x51}], 0x8, &(0x7f0000000dc0)=[{0x38, 0x19f, 0x8, "36537242b74ea3956947d372aafb4f3aeb647b5017d1a2c54a3a2e6ee5faee2112921e78cb"}, {0xd0, 0x115, 0x29, "246eabafd2c65494f0be528952eced17abc753ab65a9645606d385d2c5d23ed33f537e1eba00963c6dfe3214ef76a9d75bc90d5beb3d3514b648478dea07d2d39ffa4714577df17c86721a5cba6d5c3064e62b36b383c1af0eaaf4c2e448997cd1b0172ff2adfaf183e1b3e8c95a068732ec924c2d860a0f38ec1db72d9baeb49d7405383c6b79aad41430158c187885d43f0df2b8e9a0c6db6f1fd856a579705b09bb2310b79c0fdee2977611580de593f0e105db4346a417a2986ff3ef3354"}, {0x60, 0x12b, 0x0, "f5320ee27a995eafc793ec8cca3efc9986968e698845088d30a198b7d5df47884cadf6786e1f089a8cc818513c36d8b2e2af4907193aed4ddf6b037c6e0a9d44c5f73df2767d53514f18dd"}, {0xa0, 0x112, 0x100, "adacfb08815c1f19f470869ab556f92a22abfb164857cae91396b26eb5330ac2da4d1d2e160f49706cbe8f0578265b1080e0b38816a9afd6e3a99c7ef21c748efcd349d8f042e057b8646166691c09b3474025d13b46d0feb29a27fc8ddac8d3b5244c1b49664e1482eca54edb29f6f6c58372829194dc291c4e7ebe8680ccbb28832f8df119b05f2ad7db"}, {0x10, 0x11f, 0x7}], 0x218, 0x4000}, 0x20044080) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=""/86, 0x56) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="980000000700800000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="190000ff3186470000090011562ad208950000496c38ab009d612798d32749d97de0c6024034628f12d1148a9eece8e236fb5085dd158a389adb86013d49df481d0637119d8f2ae552853ffea609d15e42e4d0b6109ca0c79f50b126f532b966d2c3f72585b0c873ce8a45ff5d24a250dce467d421fe9193caf82f586019f3ace19b82554eb5c8c9e45e995a285ca4df517841132cd66247f4994e0cc73709fa68ddebc6943af220ab0398322d58ef5a302a4ba5a1316d7ebc5f08d8f338d85f"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000000095000000000000000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) open_by_handle_at(r0, &(0x7f0000000480)={0x41, 0x2, "eb17cd7b98bb4d24f3a62d492c74a768f3d9a1183599ef2d77fc87c69e56c0174c517320853cc9d364d42c25ee5b6b06013a7d2499e2164210"}, 0x80) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000f2598fa65c16a52100000000009500000000000000dcb57d57f4ba7112683d9eb000919e244341b07b4e6984cf347b2c15cb0f97b961c7e09f6163e08371712b302bd5c33780061e8919f14465971badf3c355545e68fc027364d9eeb98b9884e427863bf021706a224ec8f57d3bd15cc5f1b04261bab114f0510000000000000000b95dbe6b079b98408cf08b82492195f6b37ec225b7b13fe1409905c79cb8fe0ef2c657bcf36b4f81e477231d34af3941cb2dd8334152"], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000640)=""/183}, 0xfffffeb1) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = dup3(r0, r0, 0x80000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000005c0)={0x3, &(0x7f0000000580)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000640)={r2, 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="090000000300040000a8df000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) getpeername$inet(r0, &(0x7f0000000000), &(0x7f0000000540)=0x10) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000500)=@assoc_value={0x0}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x9, 0x30}, &(0x7f00000003c0)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000400)={r6, 0xffff, 0x1, 0x1, 0x1, 0x7, 0x4ed, 0x2, {r7, @in={{0x2, 0x4e23, @loopback=0x7f000001}}, 0x7ff, 0x2, 0x3, 0x6, 0x5}}, &(0x7f00000004c0)=0xb0) 2018/03/29 15:38:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18a0bf7bb3b9111e87b7160000000300000000a27f4cdd72c3a0960000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000003000000000000000000000095000000000000009a657dd7843b5124f466dbc0b5927c23b4851b887c54cf6e81193788a13e5592bfce52e958dfe7cfdbbdbd06ee0dfbeb3afc26eea5df4e357e3ff2339558b0136676090153b40ca18e0f13486121fb"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300b20f0000000000000048c0585c43a99e0000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) r5 = fcntl$dupfd(r4, 0x406, r1) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000480)={0x0, 0x1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280), &(0x7f0000000400)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183, 0x0, 0x0, [], r2}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='nr0\x00', 0xfffffffffffffed5) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r1, r3}) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000440)=0x7f, 0x4) getsockname$inet(r1, &(0x7f0000000480)={0x0, 0x0, @dev}, &(0x7f00000004c0)=0x10) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) sendto(r0, &(0x7f0000000500)="d75cef3706833cb1df387c816dec5e6b289731890623b414cf0f0b863a5d8b4a42cc0015a12947564ea0aa650e09f421f0873749de3e4fa5815d80d381a052b05c6bed7d4dd2e0e69eb8f5c426d60540e60b8f6a62d483ef0d8b91608a27ddf13f949a7c48ddc4a9c7d093af849dae811f1c537a3ad1a48425edeb063fd9f2a885729d5ed19d460945619244a51b2e9def8fae5caad1c583c0bd2e92", 0x9c, 0x4, &(0x7f0000000840)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e24}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000740d1b4e447808eb1bb6e40000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r1, &(0x7f0000000280)=@vsock, &(0x7f00000001c0)=0x80, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r5 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000100)={'gretap0\x00', {0x2, 0x4e23, @multicast1=0xe0000001}}) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r4, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f00000003c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x80003, 0x9) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000030000000000060b0000959591efffffffffffff8a56c630a6715ff957d7a337171efb207ddddfaa50855b7f9225c3d99e069a914606824c22a99df80bcad905000000e597ddaace3aa2bf2000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000380)={0x3, &(0x7f0000000340)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000440)={r4}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000f5ff9400000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=""/89, 0x59) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) shutdown(r0, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="980000000300000000000000000000000000000000000000742ec60d0a4117106f19b70b54af1f"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) socketpair(0xa, 0x7, 0x6, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000500)=""/154) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f00000005c0), &(0x7f0000000780)=0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) sendto$inet(r0, &(0x7f0000000280)="b8eacce3a22350e6a0ea04a35c7e33d5aee3490c2cb4df2fb6f0dfbe534b7c4b50b20d1fee869456a7cea0e9bf6de694abc4a3ba9eb5cab0edccd67a84f1de24224e068c74bba498f984c275667fa8fee0ecfe882d9007108860", 0x5a, 0x0, &(0x7f0000000400)={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000440)={'ip6gre0\x00', {0x2, 0x4e20, @multicast2=0xe0000002}}) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000f600008b9973c922d842064fc6dd"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000480)={'syz_tun\x00', {0x2, 0x4e22, @broadcast=0xffffffff}}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x6, 0x3, &(0x7f0000dbc000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}, [], {0x95}}, &(0x7f0000000000)="47ff3300", 0x1, 0x99, &(0x7f0000000000)=""/153}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x80, 0x2, 0x3, 0xffffffffffffffff, 0x0}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000640)={r2, 0x1000, "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"}, &(0x7f0000000380)=0x1008) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x6, 0x10001) accept$netrom(r1, &(0x7f0000000400)=@full, &(0x7f0000000480)=0x48) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000210300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000500)={r0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x1, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r5, 0x0, 0x0, 0x10001}, &(0x7f0000000340)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) ioctl$PPPIOCGMRU(r4, 0x80047453, &(0x7f0000000380)) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) modify_ldt$read_default(0x2, &(0x7f0000000500), 0x0) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={r4, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x80000000}, 0x90) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000030000020080000300000000950004000000d1b02611dffe0000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000008c0)={r2}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000840)={0x401, 0x1, {0x3, 0x1, 0x2e901f65, 0x3, 0x8010}}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r6, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) connect$bt_sco(r5, &(0x7f00000004c0)={0x1f, {0x6, 0x8, 0xfffffffffffff297, 0x572388c1, 0x0, 0x7}}, 0x8) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x40080, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000280)=0xb) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000002c0)="c3b9e694024d1fe1b01db3c31491e4be5b844eba8bbe29aad22945863728417dae5cb0a85afa600a71fe1761b0e39e6973d8d0bef861daa4576d0b449088a9bec4e697cd028648ce373e1844be52175612edd604a480e26586", 0xffffffffffffffc3}], 0x3a5, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000380)={0x9, 0xf6e}) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x80241, 0x0) r6 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x80000, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet(0x2, 0xe, 0x4000000000000612) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='ns/pid\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000940)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000b40)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000b00)={&(0x7f0000000980)=@getpolicy={0x160, 0x15, 0x200, 0x70bd25, 0x25dfdbfb, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in, 0x4e23, 0xfffffffffffffbff, 0x4e21, 0x1, 0x2, 0x80, 0x80, 0x21, 0x0, r2}, 0x6e6bb9}, [@proto={0x8, 0x19, 0xff}, @algo_comp={0xd0, 0x3, {{'lzs\x00'}, 0x438, "afbb2fb28365b8dac09598b32bba0dfad75e06de29095c2bc99d004f068bc1d4b209a015e5cf0d47ceda27eb08ac15be17aea2203b3ec2a8b957b7bf0758be1b22e6af007bc04aa3e54257930d2c69d1f5b15a9050eacd30bde503775b3641d872396e238380ed242ee424acfa5de9aa7357eedec7026d31d5e9b8b6872333b4956cd587544c92"}}, @etimer_thresh={0x8, 0xc, 0x200}, @replay_esn_val={0x30, 0x17, {0x5, 0x70bd2d, 0x70bd2b, 0x70bd25, 0x70bd2a, 0x0, [0x10000, 0x9, 0x4, 0x6, 0xfffffffffffffffc]}}]}, 0x160}, 0x1, 0x0, 0x0, 0x80}, 0x1) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000c40)=0x14, 0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000030000000000ffffffff00009500000000bb000072c66a670578cf6c9a3169f709b96e604fc6cba7969dff06d83349bf64f2d72c54e65921ae2825123eeb5c3663fdeb1651d051c0bedc40d5c5a1634b2516c796864b95cb98aca7c53095eae3b33b36952d5cb06a9bc0396b5c36f34c1ded0f17482fbcbb29270d7f0708b2f114fc23503473e64dcc7f2b2b02ad56452570477b36a34e41c3c71911ec20f94f"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r3, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={r4}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000540)={r5, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r7, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x40, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) r3 = memfd_create(&(0x7f0000000280)='syzkaller\x00', 0x2) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000400)=""/181) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f00000002c0), 0x4) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket(0x4, 0x0, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000380)=0xb) write(r0, &(0x7f0000000180)="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", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x200000c5, &(0x7f00009ff000)=@raw, &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xb7, &(0x7f0000000040)=""/183, 0xffffffffffffffff, 0xffffffffffffffff}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000580)={'nat\x00', 0x0, 0x4, 0xed, [], 0x5, &(0x7f0000000400)=[{}, {}, {}, {}, {}], &(0x7f0000000480)=""/237}, &(0x7f0000000640)=0x78) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000680)={0x0, 'ip6_vti0\x00', 0x2}, 0x18) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) accept4$packet(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000340)=0x14, 0x80000) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x14, 0x100) ioctl$KDSETMODE(r3, 0x4b3a, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200200, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800042185fe143d8e9ccfa207000300000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800a72558dd033a4e010000000000008400000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) r2 = gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r3 = memfd_create(&(0x7f0000000240)="74086e750000000000000000008c00", 0x2) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) getpgid(0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r7 = shmget(0x2, 0x3000, 0x901, &(0x7f0000ffd000/0x3000)=nil) setpriority(0x0, r2, 0x4) shmat(r7, &(0x7f0000ffd000/0x3000)=nil, 0x5000) gettid() ioctl$KVM_GET_REGS(r5, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet(0x2, 0x80003, 0x9) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000080)={@dev, 0x0}, &(0x7f00000001c0)=0x14) bind$packet(r6, &(0x7f0000000280)={0x11, 0x4, r9, 0x1, 0x401, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x14) setsockopt$IP_VS_SO_SET_ADD(r8, 0x0, 0x482, &(0x7f0000000000)={0x84, @empty, 0x0, 0x0, 'sh\x00'}, 0x2c) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x2001) openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x3ff, 0x151000) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000400)={0x6, 0x0, 0x2, 0xfffe00000000000}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000840)={0x81, r4, 0x1, 0x1}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000004c0)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000540)={r5, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r7, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000880)=0x20) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000008c0)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 7: r0 = accept(0xffffffffffffffff, &(0x7f0000000280)=@ax25, &(0x7f0000000400)=0x80) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000440), &(0x7f0000000480)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r1, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c904", 0xf6) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r1, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)={0x2, [0x0, 0x0]}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000380)={r2, 0x33, "8cfe9710defd0687628ff96604848f25bd93db6a52969f8afaea7c875a694cd426a47e9c3c3e64900e3347b382d5f8b52f35d4"}, &(0x7f00000003c0)=0x3b) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:46 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = fcntl$dupfd(r1, 0x406, r0) getpeername$packet(r2, &(0x7f0000000400), &(0x7f0000000440)=0x14) r3 = accept(r0, &(0x7f0000000340)=@pptp={0x0, 0x0, {0x0, @local}}, &(0x7f0000000000)=0x80) bind$rds(r3, &(0x7f00000003c0)={0x2, 0x4e24, @broadcast=0xffffffff}, 0x10) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:46 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:47 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e21, 0x2176, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x15}}, 0x2}}, [0x97, 0x48, 0x8001, 0x4, 0x100, 0x40, 0x81, 0x1, 0x80, 0x101, 0x9, 0xfffffffffffffffd, 0x5, 0x8, 0x7ff]}, &(0x7f00000004c0)=0x100) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000500)={r1, 0xd58}, 0x8) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r2, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r2, &(0x7f0000000840)="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", 0xfffffffffffffea6) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000000000b97aeafdf01cfd8375adf7ca3d3dcb0f623eec53a3890efc54e8fceabd6f0f576be49849661cfd656246ef5e74bdbbb6fbd68d76d7b113a9ac1a7361eb21f61a0a548652a4af4fa73f88422275ded4723cfe15393f3e8f00af3162c0b7d99455945955aab785a8e5ffc5613a61d919f6278f7bd6597e1dedf27e1d7316ffa40a9a888768d1ae656018ca9b61c3f85067b19505e7a03ce1a4bca181a8e7e39cb9e18f8cd3fea03133e04a913f3de54d264fe992ea3c8c72cdd54a1fe776065169a0776115800e973fd1"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r3, 0x50, &(0x7f0000000340)}, 0xfffffffffffffe43) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r2, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="2db8ca476a9130850768e7af14874a2906e9242e9dd073d56a7fdc356e9037c3a3a5f57bc01e86f3d87cb169e223e5529b5fbe9057c207efc07d32982dfb24fb31753149891c391ffaba0eb0371ee2e7e48aac9e96db2041d25bf30d6bba83ff9459d36bd24064f7a52d99f8fef7129010277f32c214bb3868d072de816b162ebe6cdc150f246cf56fec3c4d63e73238c614c60a3fa0a2f437de65155e7accdadd829a7cbb2009099730c04f246cc2a18c30e6108a89a28986956a2e7546ff3b77a571a56bcf896f9340467df879a28c1c8a49cd132529fa22397d01a80b2fc63a979538dcac8f056347dbc84123e031e255b7d3c90483b5212a4a525494da1b753dce8647cddb6fdfaff6c3cefabf76faac3ed266964cd5e8b0", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000540)={r3, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000480)={0x4, [0x964, 0x9, 0xfffffffffffffffc, 0x10000]}, &(0x7f00000004c0)=0xc) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MAP_BUFS(r5, 0xc0186419, &(0x7f0000000800)={0x2, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}, {0x8, 0x3c, 0x81, &(0x7f0000000780)=""/60}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) 2018/03/29 15:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000640)={@loopback, 0x0}, &(0x7f0000000680)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000006c0)={@remote={0xfe, 0x80, [], 0xbb}, 0x23, r2}) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000600)={r0, r3}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = openat(0xffffffffffffffff, &(0x7f0000000840)='./file1\x00', 0x1, 0x2) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000a80)=[0x3]) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="08000000030000000000001d0000000095800000000000004099ceb940abd023edca2e635d00f26fd4c693eb7a2876b2119bef5b86253cef15dba594e09fe2f53e7df1f36a1bfd8b6f219370a20b824fc061e997b422e81c4a591ff6952de19b8dc4f7c10d3362ed"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) r4 = semget$private(0x0, 0x3, 0x104) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/mixer\x00', 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000a40)='./file1\x00', 0x680402, 0x80) fanotify_mark(r5, 0x88, 0x20, r6, &(0x7f0000000880)='./file1\x00') semctl$GETALL(r4, 0x0, 0xd, &(0x7f00000007c0)=""/16) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000800)=0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000980)={0x0, 0x3}, &(0x7f00000009c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000a00)={r7, 0x6}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r2}) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000002c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r9 = getpgrp(0xffffffffffffffff) accept4(r6, &(0x7f00000008c0)=@generic, &(0x7f0000000940)=0x80, 0x80000) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$dsp(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/dsp\x00', 0x8000, 0x0) getgroups(0x4, &(0x7f0000000440)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000480)={r9, r10, r11}, 0xc) ioctl$UFFDIO_API(r8, 0xc018aa3f, &(0x7f0000000340)={0xaa, 0x20}) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f00000005c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x2, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000600000000000000010000620800080000000000000000010000070809000500000000000000000000009500000000000000000000000000000018000000122a00000000000007000000950000000000000000000000000000009500000000000000"], &(0x7f0000000540)='GPL\x00', 0xfffffffffffffffd, 0x1f, &(0x7f0000000580)=""/31, 0x41100, 0x1, [], r12}, 0x48) 2018/03/29 15:38:47 executing program 6: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x0, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x0, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffff00}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) sync_file_range(r0, 0xf6, 0x6, 0x3) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x105000, 0x0) gettid() ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f00000000c0)={'gre0\x00', 0xffffffffffffffe1}) r2 = memfd_create(&(0x7f00000005c0)="7549ae7500000041e404d0d83ec7ce6a18aeece670b99152323d7f3a0f6832695bb98677e1e048445c5b0a893f6cefcb43661bbeb8923c7821b53ce6390c3f9528562ae911da2f66b31f332c32563b52232c143541aa51010400000000000500000000000000", 0xffffffffffffffff) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x81003) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getpgid(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0xfff8000000000004, 0x0) r5 = shmget(0x2, 0x3000, 0x903, &(0x7f0000ffd000/0x3000)=nil) syz_emit_ethernet(0x238, &(0x7f0000000280)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @empty, [{[{0x9100, 0x6e5e, 0x6, 0x2}], {0x8100, 0x5, 0x100, 0x3}}], {@ipv6={0x86dd, {0x2, 0x6, "b6b9a7", 0x1fa, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @dev={0xfe, 0x80, [], 0xa}, {[@routing={0x8, 0x12, 0x3, 0x3, 0x0, [@empty, @empty, @dev={0xfe, 0x80, [], 0x15}, @mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, @mcast2={0xff, 0x2, [], 0x1}, @local={0xfe, 0x80, [], 0xaa}, @mcast1={0xff, 0x1, [], 0x1}]}, @srh={0xaf, 0xa, 0x4, 0x5, 0x400000000000, 0x5, 0x2, [@mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @rand_addr=0x6}, @mcast1={0xff, 0x1, [], 0x1}]}, @fragment={0x3c, 0x0, 0xfffffffffffffff9, 0x7f, 0x0, 0x8, 0x67}, @dstopts={0x2e, 0x0, [], [@pad1={0x0, 0x1}]}, @hopopts={0x3a, 0x2, [], [@hao={0xc9, 0x10, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xf}}}]}], @dccp={{0x4e20, 0x4e22, 0x4, 0x1, 0x101, 0x0, 0x0, 0x0, 0x7fff, "e48c48", 0xc04, "4daf02"}, "71f6ef93e6d59622c645a710e13d76d1cb30c302e858f704bce84eaf056d619424e627d77b38df2600c2be70411e3ef90b550a5b784b9595e2fdcf0fde62e98c99b6d3c7a1edd12808efaaf91905d013436fe8dc98c07a308d10c81cb44d1eeb9410f23cfdc2be55c5d2152a16f9ba577328992e9c6a84a3e56e364c728e98cf56cf0dada745b0e7d51d1cf819100e1f27a76dfa1e43f94f7bb47e4c61fa59cdff8b0759cb43460a1f3f0faaa634c3e3f909d6ddeebdf338b6262adfcc83744131a5"}}}}}}, &(0x7f0000000080)={0x0, 0x4, [0xb02, 0x195, 0x7dc, 0xd24]}) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x5000) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x0, 0xa, 0x7bf5, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_udp_int(r7, 0x11, 0x66, &(0x7f0000000300)=0x6, 0x4) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) rt_sigqueueinfo(r8, 0x7, &(0x7f0000000240)={0x36, 0x7, 0x7}) setsockopt$inet_mreqn(r6, 0x0, 0x27, &(0x7f0000000140)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000040)) rt_sigqueueinfo(r8, 0x10, &(0x7f0000000280)={0x13, 0x800, 0x3725, 0x8b}) setsockopt$inet_MCAST_JOIN_GROUP(r6, 0x0, 0x2a, &(0x7f0000000180)={0x7, {{0x2, 0x4e22, @multicast2=0xe0000002}}}, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/03/29 15:38:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:47 executing program 5: socketpair(0xc, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf7, 0x0, 0x1, 0x0, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x3, 0x10001, 0x1000, 0x100, 0x7fff, 0x4000000000000, 0x3ff, 0x3, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x400000000003, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, 0xffffffffffffffff, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0xfffffd5d, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x0, 0x4f, 0x1000, 0x0, 0x1, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x233}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000001d40)='reiserfs\x00', 0x100040, 0x0) mkdir(&(0x7f00000009c0)='./file0/file1\x00', 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f00000006c0)='./file0/file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001fc0)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x5d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x4, 0x0, 0xb, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffe, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="dc1100002045c2ec6400000000000000303feefcd8ed6d9f59838c84a14ac2dd57f974eb010400c5645f821ae2c18320dc83c500daec80a190a763f4ec9766bbc9ac62b9ecfdb74efb8a84e98d2820891af87543f2702f26034eac2898d9726587c92418e559e7e237b2"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) mount(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000980)='hostfs\x00', 0x806beed795c5a2e2, 0x0) 2018/03/29 15:38:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) openat$ion(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ion\x00', 0x109100, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r0, r1}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @remote, @multicast2}, &(0x7f0000000380)=0xc) 2018/03/29 15:38:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000000e) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)=0xfffffdfd) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0xc0200) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0x7b, @dev={0xac, 0x14, 0x14, 0x18}, 0x4e24, 0x0, 'ovf\x00', 0x20, 0x6, 0x3}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f00000000c0)={0x7ff, 0x401, 0x7}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x20, 0x0, 0x7f}, &(0x7f0000000200)=0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={r2, 0xfffffffffffffffa}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) 2018/03/29 15:38:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xe, &(0x7f0000000440), &(0x7f0000000480)=0x4) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000009500000000040000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x800}, &(0x7f0000000580)=0x14) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) pselect6(0x40, &(0x7f0000000000)={0x0, 0x8, 0x3, 0x5, 0x80000001, 0x6, 0x3f, 0x6}, &(0x7f00000002c0)={0x7, 0x7000000, 0x6, 0xffff, 0x6, 0xfffffffffffffff9, 0x9670, 0x1a}, &(0x7f0000000340)={0x846, 0xfffffffffffffffa, 0x9, 0x1, 0x7, 0x5, 0x6, 0xfff}, &(0x7f0000000380)={0x0, 0x1c9c380}, &(0x7f0000000400)={&(0x7f00000003c0)={0xffff}, 0x8}) 2018/03/29 15:38:47 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [], {0x95}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='yam0\x00', 0x10) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, &(0x7f0000000800)={0x1, &(0x7f0000000640)=""/155, &(0x7f00000007c0)=[{0xfffffffffffffffb, 0x6e, 0x8, &(0x7f0000000700)=""/110}]}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) 2018/03/29 15:38:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write(r0, &(0x7f0000000180)="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", 0x11a) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r1, 0x50, &(0x7f0000000340)}, 0x10) r3 = fcntl$dupfd(r1, 0x406, r1) r4 = openat(r3, &(0x7f0000000480)='./file0\x00', 0x200, 0xa) modify_ldt$write2(0x11, &(0x7f00000007c0)={0x5f1, 0x1000, 0xffffffff, 0x1, 0x401, 0x5d, 0x9, 0x3, 0x1, 0x5}, 0x10) recvfrom$ipx(r4, &(0x7f00000004c0)=""/8, 0x8, 0x40000000, &(0x7f0000000840)={0x4, 0x20, 0x2, "5db7a30bb6f3", 0x7}, 0x10) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000a00)={0x0, 0x80000, r3}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000a40)={r5, 0x80000, r4}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000a80)={0x0, @in6={{0xa, 0x4e21, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x270, 0x9, 0x6eb7, 0x100000001, 0x9}, &(0x7f0000000b40)=0x98) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000b80)={0x0, 0x2, 0x0, 0x7, 0x1000}, &(0x7f0000000bc0)=0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000c40)={0x0, 0x65, "15c04b98dd9f86f158c280d9fba2a89ef5a7fbc7c89c95abf52c46e8393549703a80122a7cd467993a47d9f8c3c1c0bbac3f5f3bd296d2b3d62856514465290e818f6e5f6104fcd413daeb3a511713892906ae3e2b9143d6c6de20df975b9480090f1386ca"}, &(0x7f0000000cc0)=0x6d) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000c00)={r6, 0xc}, &(0x7f0000000440)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000500)={r2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000540)={r7, 0x400, 0x3, 0x800, 0x81, 0x59b5}, &(0x7f0000000580)=0x14) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f0000000880)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000008c0)={r9}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000005c0)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000700)=""/139) ioctl$DRM_IOCTL_MAP_BUFS(r10, 0xc0186419, &(0x7f0000000800)={0x0, &(0x7f0000000640)=""/155, &(0x7f00000007c0)}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000600)={r0, r1}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000300)=0xfffffffffffff801, 0x4) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) fremovexattr(r2, &(0x7f0000000900)=ANY=[@ANYBLOB="757365722e2d726f0000000000003c7f38d77a214cbd3023638a67bb116059f8d11e52f815b3342f673f431f4b91c6944518f5b42640b303d0805b4a16b6bfcb132ac82aecc3287888bcdef8084defc04c5d23e83558affe4a50f37eb4feb8607df3d18b1d45c492897023da1696f11296740eb9bf5242739f5464cfa8d991d8f1dccb281c820b55417d7b85642bcbb8c8b5365e470ba630c4532328c1a56486780f7a541b840d60df6bf58c8b9662c1551045e6059cc826c989898cf8b3ab4709193ff61e3c04d64561236237819cb3b79e40e1a41d20645e0000000000000000"]) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)) [ 253.364665] WARNING: CPU: 0 PID: 6825 at net/strparser/strparser.c:532 strp_done+0xb7/0xe0 [ 253.373103] Kernel panic - not syncing: panic_on_warn set ... [ 253.373103] [ 253.380461] CPU: 0 PID: 6825 Comm: syz-executor0 Not tainted 4.16.0-rc7+ #5 [ 253.387541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.396870] Call Trace: [ 253.399438] dump_stack+0x194/0x24d [ 253.403045] ? arch_local_irq_restore+0x53/0x53 [ 253.407692] ? vsnprintf+0x1ed/0x1900 [ 253.411477] panic+0x1e4/0x41c [ 253.414644] ? refcount_error_report+0x214/0x214 [ 253.419375] ? show_regs_print_info+0x18/0x18 [ 253.423854] ? __warn+0x1c1/0x200 [ 253.427288] ? strp_done+0xb7/0xe0 [ 253.430799] __warn+0x1dc/0x200 [ 253.434052] ? strp_done+0xb7/0xe0 [ 253.437568] report_bug+0x1f4/0x2b0 [ 253.441175] fixup_bug.part.11+0x37/0x80 [ 253.445219] do_error_trap+0x2d7/0x3e0 [ 253.449087] ? math_error+0x400/0x400 [ 253.452863] ? print_irqtrace_events+0x270/0x270 [ 253.457595] ? find_held_lock+0x35/0x1d0 [ 253.461641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.466462] do_invalid_op+0x1b/0x20 [ 253.470153] invalid_op+0x1b/0x40 [ 253.473580] RIP: 0010:strp_done+0xb7/0xe0 [ 253.477698] RSP: 0018:ffff8801d0caf768 EFLAGS: 00010212 [ 253.483038] RAX: 0000000000010000 RBX: ffff8801c456b388 RCX: ffffffff85e7a857 [ 253.490294] RDX: 00000000000000eb RSI: ffffc90001832000 RDI: ffff8801c456b390 [ 253.497537] RBP: ffff8801d0caf780 R08: 1ffff1003a195eb8 R09: 0000000000000000 [ 253.504780] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801cbf69980 [ 253.512027] R13: ffff8801d0caf988 R14: 0000000000000000 R15: ffff8801d0caf848 [ 253.519283] ? strp_done+0xb7/0xe0 [ 253.522802] ? strp_done+0xb7/0xe0 [ 253.526319] kcm_ioctl+0xf6e/0x1820 [ 253.529937] ? kcm_unattach+0x1520/0x1520 [ 253.534077] ? trace_hardirqs_off+0x10/0x10 [ 253.538377] ? trace_hardirqs_off+0x10/0x10 [ 253.542699] sock_do_ioctl+0xef/0x390 [ 253.546482] ? compat_ifr_data_ioctl+0x170/0x170 [ 253.551215] ? __fget+0x342/0x5b0 [ 253.554645] ? lock_downgrade+0x980/0x980 [ 253.558771] ? lock_release+0xa40/0xa40 [ 253.562726] ? __lock_is_held+0xb6/0x140 [ 253.566772] sock_ioctl+0x367/0x670 [ 253.570376] ? sock_ioctl+0x367/0x670 [ 253.574150] ? __fget+0x36b/0x5b0 [ 253.577579] ? dlci_ioctl_set+0x40/0x40 [ 253.581533] ? iterate_fd+0x3f0/0x3f0 [ 253.585309] ? __local_bh_enable_ip+0x121/0x230 [ 253.589953] ? __release_sock+0x360/0x360 [ 253.594075] ? kcm_setsockopt+0x306/0x6a0 [ 253.598203] ? dlci_ioctl_set+0x40/0x40 [ 253.602153] do_vfs_ioctl+0x1b1/0x1520 [ 253.606020] ? do_vfs_ioctl+0x1b1/0x1520 [ 253.610056] ? kcm_setsockopt+0x15e/0x6a0 [ 253.614179] ? putname+0xee/0x130 [ 253.617614] ? ioctl_preallocate+0x2b0/0x2b0 [ 253.622000] ? fget_raw+0x20/0x20 [ 253.625429] ? __fdget+0x18/0x20 [ 253.628778] ? SyS_futex+0x269/0x390 [ 253.632470] ? SyS_setsockopt+0x215/0x360 [ 253.636596] ? do_futex+0x22a0/0x22a0 [ 253.640378] ? security_file_ioctl+0x89/0xb0 [ 253.644765] SyS_ioctl+0x8f/0xc0 [ 253.648108] ? do_vfs_ioctl+0x1520/0x1520 [ 253.652235] do_syscall_64+0x281/0x940 [ 253.656097] ? __do_page_fault+0xc90/0xc90 [ 253.660305] ? _raw_spin_unlock_irq+0x27/0x70 [ 253.664775] ? finish_task_switch+0x1c1/0x7e0 [ 253.669246] ? syscall_return_slowpath+0x550/0x550 [ 253.674153] ? syscall_return_slowpath+0x2ac/0x550 [ 253.679145] ? prepare_exit_to_usermode+0x350/0x350 [ 253.684136] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 253.689482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.694309] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 253.699474] RIP: 0033:0x4548b9 [ 253.702637] RSP: 002b:00007fd89aad1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.710318] RAX: ffffffffffffffda RBX: 00007fd89aad26d4 RCX: 00000000004548b9 [ 253.717563] RDX: 00000000200003c0 RSI: 00000000000089e0 RDI: 0000000000000017 [ 253.724805] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 253.732051] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 253.739296] R13: 00000000000003aa R14: 00000000006f7890 R15: 0000000000000000 [ 253.747436] Dumping ftrace buffer: [ 253.751240] (ftrace buffer empty) [ 253.754927] Kernel Offset: disabled [ 253.758526] Rebooting in 86400 seconds..