INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.62' (ECDSA) to the list of known hosts. 2018/04/07 04:24:26 fuzzer started 2018/04/07 04:24:27 dialing manager at 10.128.0.26:38639 2018/04/07 04:24:32 kcov=true, comps=false 2018/04/07 04:24:35 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) tkill(r3, 0x16) 2018/04/07 04:24:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newneigh={0x28, 0x1c, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, r2, 0x9}, [@NDA_DST_MAC={0xc, 0x1, @link_local={0x1, 0x80, 0xc2}}]}, 0x28}, 0x1}, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'security\x00'}, &(0x7f00000001c0)=0x54) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendto$inet(r0, &(0x7f0000000800), 0x0, 0x0, &(0x7f0000000880)={0x2, 0x4000004e20, @multicast1=0xe0000001}, 0x10) 2018/04/07 04:24:35 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r0, 0x1, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 2018/04/07 04:24:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) r1 = eventfd2(0x0, 0x0) r2 = socket$inet(0x2, 0x803, 0x8) io_setup(0x20, &(0x7f0000c6b000)=0x0) io_submit(r3, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00001b0000)='l', 0x1, 0x0, 0x0, 0x1, r1}]) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000000)={'nr0\x00', 0x6}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) dup2(r2, r1) shutdown(r0, 0x0) 2018/04/07 04:24:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006980)=0xe8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000580)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000069c0)={@dev={0xfe, 0x80}}, 0x14) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x3}, &(0x7f0000000380)=0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000840)}, 0x40000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x2c, &(0x7f00000003c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x7}]}, &(0x7f0000000480)=0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000200)=[r3]) fchmod(0xffffffffffffffff, 0x101) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000780)) 2018/04/07 04:24:35 executing program 6: r0 = epoll_create(0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_pwait(r0, &(0x7f0000c58000)=[{}], 0x1, 0x0, &(0x7f0000654ff8), 0x8) 2018/04/07 04:24:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0), 0x0) write(r1, &(0x7f0000000180)="791f7dfde0815c48413197fc2e324deacdaf4e6b5ff2fb177650adca7f89bf3093fc711cd3281e254a65d982d75d4000860e0027a064c14e1962e5c3ac852026442855191e1bea205db26724eb9c1973b90bd8a989d4e916ccb602aaa05a5a66223503b652f7386a828157f8434b2dea886d4643766d62d856c93d7c93d2d58a171a8f90872c15696b18d3684fe54e79a3", 0x91) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x5c, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0xfffffe24}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/07 04:24:35 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="64d745c5", 0x0) write(r0, &(0x7f0000000080)="164690f11220a8", 0x7) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) syzkaller login: [ 41.991370] ip (3760) used greatest stack depth: 54688 bytes left [ 42.428953] ip (3798) used greatest stack depth: 54672 bytes left [ 42.574792] ip (3814) used greatest stack depth: 54072 bytes left [ 45.645924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.674308] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.692515] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.740699] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.773280] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.781092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.920332] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.988992] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 54.404149] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.503169] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.511760] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.591231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.645734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.713750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.821708] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 54.955753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 55.143407] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.149635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.157750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.213924] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.220133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.231550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.283640] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.289867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.314135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.376225] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.384828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.399877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.419470] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.432491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.460602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.485653] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.492103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.505531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.618299] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.624589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.638836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.811292] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 55.817571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.828974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.272444] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 2018/04/07 04:24:52 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x22001}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'bridge0\x00\x00 \x00'}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000006880)={{{@in6=@loopback, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006980)=0xe8) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000580)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000069c0)={@dev={0xfe, 0x80}}, 0x14) lseek(r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x3}, &(0x7f0000000380)=0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000004c0)=@in={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f00000007c0), 0x0, &(0x7f0000000840)}, 0x40000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000440)={0x0, 0x2c, &(0x7f00000003c0)=[@in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x4e24, 0x8, @remote={0xfe, 0x80, [], 0xbb}, 0x7}]}, &(0x7f0000000480)=0x10) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000200)=[r3]) fchmod(0xffffffffffffffff, 0x101) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000780)) 2018/04/07 04:24:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00005cffe4)={0xd, 0x0, 0x0, 0x0, 0x0, r0}, 0x1c) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, @loopback}, &(0x7f0000000280)=0x10) getpeername$inet(r1, &(0x7f0000000480)={0x0, 0x0, @dev}, &(0x7f00000004c0)=0x10) r2 = accept4(r1, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @host}, &(0x7f0000000080)=0x80, 0x80000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000003c0)={{0xa, 0x2, 0x80000000, @dev={0xfe, 0x80, [], 0xe}, 0x5}, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0xa}, 0x3}, 0xffffffffffffffc0, [0xcfc3, 0x6, 0x8, 0x5, 0x4, 0x100000001, 0x3, 0x5]}, 0x5c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000140)={r3, 0xfa, 0x21}, 0xc) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x3ff, {{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xffffffffffffff7a) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000440)={0x80000001, 0x6}, 0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e23, 0x100000001, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, 0xfff, 0x1, 0x4, 0x5d4, 0x8}, 0x98) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f00000002c0), 0x4) [ 56.532591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 2018/04/07 04:24:52 executing program 7: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) r0 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000140), 0x10) mknodat(r0, &(0x7f000003f000)='./control\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) bind$inet(r1, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) execveat(r0, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040), 0x0) 2018/04/07 04:24:52 executing program 1: unshare(0x24000200) unshare(0x20020000) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./control\x00', 0x1, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="02aff63ad7f47b454234b32f50b10e0d22325b1b2c96f2fcdc1cb795860c421074b373685d9b091099fabe0daff7ff04973007ce98bf3cc5e86266b71767193142e5ac74f6fce92582b927e088d4e4651c0fb7ecf495856fb8a522dbf62414ee8c391e0af3b264d80b3c4f3e27b10e84513056b7f84192cc9442c8c055bbfa5ecc283cf31e808c5f313a1b8acd5819551fae4eadf9", 0x95, 0x3}], 0x6, &(0x7f00000003c0)=ANY=[]) mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) mknodat(r0, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(r0, &(0x7f0000010000)='./control\x00', &(0x7f00000003c0), &(0x7f0000000380)=[&(0x7f0000000280)='hfs\x00'], 0x0) setsockopt$inet_buf(r0, 0x0, 0x3d, &(0x7f00000003c0)="7884b9169f469f5a26211a6f7bb5ea98594f56715bf7efb62c65b7a01fb37fc9c113122bf211a735ef77bd5fe158b8ea9ae1e887b01d1665efd553175e90f59f69ec030176b7980b7f7fe46c2e9cad4d953bd875e7195a345693a60ab04fff7dc1e5aed84591f5a0a13e4647ef8516d6177f8bde329caf1fb941cbd391420ed0563613", 0x83) 2018/04/07 04:24:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = getpid() ioprio_get$pid(0x3, r3) r4 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r4, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r4, 0x4b36) recvmsg$netrom(r4, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r4, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r4, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0xc7314de2bec93b56, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1f8) 2018/04/07 04:24:52 executing program 2: mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x1000004, 0x10000032, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={0xa2a9, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x4e22}, {0x2, 0x0, @broadcast=0xffffffff}, 0x80, 0x80000001, 0x7, 0xfffffffffffffffc, 0x100000000, 0x0, 0xd7e0, 0x0, 0x200}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6]}, 0x5c) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000140)={0x6ca5, 0x80000001, 0x1, 0x400, 0x6, [{0x2, 0x4, 0x0, 0x0, 0x0, 0x2303}, {0x3f, 0x2, 0x1}, {0x6, 0x7fffffff, 0xea3, 0x0, 0x0, 0x200}, {0x80, 0x3f, 0x1, 0x0, 0x0, 0x1000}, {0xb07b, 0x0, 0x7f, 0x0, 0x0, 0x1}, {0x8, 0x2}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xf566, 0x800) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)=0x0) syz_open_procfs(r3, &(0x7f0000000300)='net/nfsfs\x00') getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) mount(&(0x7f00000003c0)='./control\x00', &(0x7f0000000400)='./control\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r5, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r5, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r5, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000a8cff0)={0x1, &(0x7f0000528000)=[{0x6}]}, 0x10) close(r4) fchdir(r6) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000240)='./control\x00', 0x0, 0x0, &(0x7f0000000480), 0x40000, &(0x7f0000000840)=ANY=[]) 2018/04/07 04:24:52 executing program 6: r0 = epoll_create(0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) epoll_pwait(r0, &(0x7f0000c58000)=[{}], 0x1, 0x0, &(0x7f0000654ff8), 0x8) 2018/04/07 04:24:53 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000140)) mkdir(&(0x7f0000000b40)='./file0/.ile0\x00', 0x0) 2018/04/07 04:24:54 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) tkill(r3, 0x16) 2018/04/07 04:24:54 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="64d745c5", 0x0) write(r0, &(0x7f0000000080)="164690f11220a8", 0x7) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) 2018/04/07 04:24:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = getpid() ioprio_get$pid(0x3, r3) r4 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r4, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r4, 0x4b36) recvmsg$netrom(r4, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r4, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r4, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0xc7314de2bec93b56, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1f8) 2018/04/07 04:24:54 executing program 2: mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x1000004, 0x10000032, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={0xa2a9, {0x2, 0x0, @multicast1=0xe0000001}, {0x2, 0x4e22}, {0x2, 0x0, @broadcast=0xffffffff}, 0x80, 0x80000001, 0x7, 0xfffffffffffffffc, 0x100000000, 0x0, 0xd7e0, 0x0, 0x200}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6]}, 0x5c) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000140)={0x6ca5, 0x80000001, 0x1, 0x400, 0x6, [{0x2, 0x4, 0x0, 0x0, 0x0, 0x2303}, {0x3f, 0x2, 0x1}, {0x6, 0x7fffffff, 0xea3, 0x0, 0x0, 0x200}, {0x80, 0x3f, 0x1, 0x0, 0x0, 0x1000}, {0xb07b, 0x0, 0x7f, 0x0, 0x0, 0x1}, {0x8, 0x2}]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xf566, 0x800) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)=0x0) syz_open_procfs(r3, &(0x7f0000000300)='net/nfsfs\x00') getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000080)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) mount(&(0x7f00000003c0)='./control\x00', &(0x7f0000000400)='./control\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r5, 0x1, 0x7, &(0x7f0000387000), 0x4) sendmmsg$unix(r5, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r5, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000a8cff0)={0x1, &(0x7f0000528000)=[{0x6}]}, 0x10) close(r4) fchdir(r6) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000240)='./control\x00', 0x0, 0x0, &(0x7f0000000480), 0x40000, &(0x7f0000000840)=ANY=[]) 2018/04/07 04:24:54 executing program 1: unshare(0x24000200) unshare(0x20020000) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./control\x00', 0x1, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="02aff63ad7f47b454234b32f50b10e0d22325b1b2c96f2fcdc1cb795860c421074b373685d9b091099fabe0daff7ff04973007ce98bf3cc5e86266b71767193142e5ac74f6fce92582b927e088d4e4651c0fb7ecf495856fb8a522dbf62414ee8c391e0af3b264d80b3c4f3e27b10e84513056b7f84192cc9442c8c055bbfa5ecc283cf31e808c5f313a1b8acd5819551fae4eadf9", 0x95, 0x3}], 0x6, &(0x7f00000003c0)=ANY=[]) mkdir(&(0x7f000000e000)='./control\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040)=[&(0x7f0000000000)='eth1\x00'], 0x0) 2018/04/07 04:24:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0xfffffffffffffcdf, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket(0x200000000010, 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f00001cb000)={&(0x7f00008e5ff4)={0x10, 0x0, 0x0, 0x8004400}, 0xc, &(0x7f0000f4a000)={&(0x7f0000000180)=ANY=[@ANYBLOB="ca2297e3633edf066a810328e8a1f0f82c814a0274ca0800000000000000b8e93e7ef7dbac06f9208f651ce78dfd0871cb16f711f991ff6f040d8fe45d68fbffffff7f9507000000000000006b661db3bb1460237fbebc160f219d935050b9d8430ad962b233755125a8"], 0x1}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x71, "ca8ce75446d2c96b645e781beecb1ee25ffc9935c65bf9495b8a173600c4132b13a2c71649b85e0fc0ef731e53a57e5c8ca0cf2b18fec6a696777cb49f1cfbe0c80ffb645da3209a181b55b5bd56272e4edc46df0f47af37822f59333991d91cc2d2afcc43e2d5e670afe50f169fd62d4a"}, &(0x7f0000000080)=0x79) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r2, 0x101}, 0x8) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) write(r1, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000000000000ffffffff0100ff10", 0x24) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='vlan0\x00') prctl$intptr(0x24, 0x7f) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000184000)={0x2, 0x4000000000000d, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@multicast1=0xe0000001}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}, @sadb_x_sec_ctx={0x1, 0x18}]}, 0x88}, 0x1}, 0x0) 2018/04/07 04:24:54 executing program 7: clone(0x0, &(0x7f0000000140)="bf67a48aee9d29fafc12d87d4ac7268b406f1cec55da3f0917d09b22fdda0057c7f079e80ab43c47f5a50e463946d6161abf2473ad6886d3c45377b3ee51969f03743263d02e94d943c74a0bcc5c8c86d6422255b8451c253dbeaeba4f1f1f784cec9025c1f1d163f0646ab614f51a970cf1873602ed270273ca6539ebcdfc3c86f19b6b69e1e3d57be8ad020868e584001752bac0d0b715c9db2a98d55b28674dc536a58fe364087907d7d12fc3521b068c9ec941fa5aa4f73d479acf2d2d189e64e15b1b8e", &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x3, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x101) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c81, r1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) write(r2, &(0x7f0000001e00)="f13fc2091551646c95bed55b6d1c5fc7c983e24cc257a9b30cbc28fed1", 0x1d) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='ipddp0\x00') r3 = open(&(0x7f0000000500)='./file0\x00', 0x610000, 0x38) r4 = accept4(r2, &(0x7f00000020c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002140)=0x80, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000580)={@dev={0xfe, 0x80, [], 0x18}, 0x1a, r5}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, r1) r6 = openat$cgroup_ro(r3, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r7 = syz_open_pts(r3, 0x8000) chmod(&(0x7f0000000540)='./file0/file0\x00', 0x17e) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001e40)={0x0}, &(0x7f0000001e80)=0xc) r9 = getpgrp(r8) process_vm_writev(r9, &(0x7f0000001c80)=[{&(0x7f0000000780)=""/200, 0xc8}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000880)=""/136, 0x88}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/210, 0xd2}, {&(0x7f0000000640)=""/57, 0xffe8}, {&(0x7f0000001a40)=""/239, 0xef}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/81, 0x51}], 0x9, &(0x7f0000000680)=[{&(0x7f0000001d40)=""/139, 0x72}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x3, 0x8000, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000003c0)={0x7f, 0xc1e1cd7b5eee9dd6, 0x3, 0x4, r10}, &(0x7f0000000400)=0x10) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f00000005c0)) r11 = request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000740)='ipddp0\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0x0, r11) getsockopt$inet_mreqn(r6, 0x0, 0x0, &(0x7f00000002c0)={@rand_addr, @remote}, &(0x7f0000000300)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) mlockall(0xfffffffffffffffc) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000440)=""/100, 0x64, 0x1, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}, 0xcf}, 0x10) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000627ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r12, 0x540d) 2018/04/07 04:24:54 executing program 3: nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f00005bfff0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f00008a6000/0x2000)=nil, 0x4000) shmat(0x0, &(0x7f00009e2000/0x3000)=nil, 0x7000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000088000/0x1000)=nil, 0x1000) shmat(0xffffffffffffffff, &(0x7f00009a2000/0x3000)=nil, 0x2000) shmat(0x0, &(0x7f00004cb000/0x1000)=nil, 0x2000) r0 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x3000)=nil, 0x7000) shmdt(r0) 2018/04/07 04:24:54 executing program 1: unshare(0x24000200) unshare(0x20020000) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./control\x00', 0x1, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="02aff63ad7f47b454234b32f50b10e0d22325b1b2c96f2fcdc1cb795860c421074b373685d9b091099fabe0daff7ff04973007ce98bf3cc5e86266b71767193142e5ac74f6fce92582b927e088d4e4651c0fb7ecf495856fb8a522dbf62414ee8c391e0af3b264d80b3c4f3e27b10e84513056b7f84192cc9442c8c055bbfa5ecc283cf31e808c5f313a1b8acd5819551fae4eadf9", 0x95, 0x3}], 0x6, &(0x7f00000003c0)=ANY=[]) mkdir(&(0x7f000000e000)='./control\x00', 0x0) mknodat(0xffffffffffffffff, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(0xffffffffffffffff, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040)=[&(0x7f0000000000)='eth1\x00'], 0x0) 2018/04/07 04:24:54 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f0000000240)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f000062e000)={&(0x7f0000690ff6)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000ff0)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r1) close(r0) r3 = getpid() ioprio_get$pid(0x3, r3) r4 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') readv(r4, &(0x7f0000000740)=[{&(0x7f0000000200)=""/41, 0x29}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000002c0)=""/32, 0x20}, {&(0x7f00000005c0)=""/68, 0x44}, {&(0x7f0000000640)=""/240, 0xf0}], 0x6) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000180)={0x1000, 0x1, 0xff, 0x1, 0xf5d1}, 0xc) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDENABIO(r4, 0x4b36) recvmsg$netrom(r4, &(0x7f0000001080)={&(0x7f0000000780)=@ax25={0x3, {"3c1b7251c1894a"}}, 0x10, &(0x7f0000000fc0), 0x0, &(0x7f0000000ac0), 0x0, 0x80}, 0x40000140) sendto(r4, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x3, 0x1, 0x0, 0x2, {0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x80) ptrace$peek(0x1, 0x0, &(0x7f00000001c0)) mlockall(0x3) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)="ad413983dce8fda692b19ca665e8ec77fa460cd42977c0457fd5e513959b8c97ae621bb4901c4e02feb9c506bb7a185e14ce240442c0569367f41339a6de4e23d1c7ab2eec7dc1dc53ce1c19d3504046b72e65dabe993f437b12590fe45fc9a1236595beacd35ff917e5a427d696b47b636d7b8ab7a062ac1180123f81627f543e06398f178e65a5f2920a33200f49ae23b1750ee243d672a52ec9bcc307ac32ec5b8c81d340629118e2f350b2e2f6c2e23459ddb4e2be") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='bdev\x00', 0x100000, &(0x7f00000002c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000a80)={0x1, &(0x7f0000000080)=[{0x8, 0x0, 0xdda3}]}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='.', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000200)) mount(&(0x7f00000008c0)='.', &(0x7f0000000a40)='./file0\x00', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000980)) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000a00)=0x439d0444) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0x0, &(0x7f0000d1cfff)="d6") preadv(r4, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000ac0], 0x0, &(0x7f00000004c0), &(0x7f0000000ac0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x0, 0x63, 0x0, 'eql\x00', 'ipddp0\x00', 'nr0\x00', 'ip6gre0\x00', @empty, [0x0, 0xc7314de2bec93b56, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x0, 0xff], 0x70, 0xb8, 0xe0}, [@common=@log={'log\x00', 0x24, {{0x10001, "25d4237edf0250c72ef30c7f911844fe0b5b7267b1682a34651f081c5bc3", 0xb}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x4, {{0xfffffffffffff52e}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x1f8) 2018/04/07 04:24:54 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x3f, "6114977c2278b6350ca8b8e1cedcd0e0d2c4b322624a1c898d906516090261b89238efe1eb2817b44d3ed1aad3d9eec74c658d151ad301c48942dbfb202dae"}, &(0x7f0000000200)=0x63) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x29, 0x6, 0x8, 0x7fffffff, 0x5, 0x18, 0x401, {0x0, @in6={{0xa, 0x4e21, 0x3, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x9}}, 0xfffffffffffffffb, 0xfffffffffffffffa, 0x4, 0x2}}, &(0x7f0000000140)=0xb0) socketpair(0x1a, 0x800, 0x101, &(0x7f0000000000)={0xffffffffffffffff}) pwrite64(r1, &(0x7f0000000240)="a48d90f08d672d960b761092c9838646ab6a243d76da2c09e67a827189cfbf41574b91adf573330a630d9194fe5dc6dc9f1ab1ae8e9e4ba82968d1399696ae808c281bee4808deca1e35", 0x4a, 0x0) r2 = socket$netlink(0x10, 0x3, 0x100000000004) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000f8f000)=0x6, 0x4) write(r2, &(0x7f0000ff2fd9)="2700000014000707030e0000120fe70010ffe0f41207f4cd0a19000000000000240800390075ed", 0x27) 2018/04/07 04:24:54 executing program 7: clone(0x0, &(0x7f0000000140)="bf67a48aee9d29fafc12d87d4ac7268b406f1cec55da3f0917d09b22fdda0057c7f079e80ab43c47f5a50e463946d6161abf2473ad6886d3c45377b3ee51969f03743263d02e94d943c74a0bcc5c8c86d6422255b8451c253dbeaeba4f1f1f784cec9025c1f1d163f0646ab614f51a970cf1873602ed270273ca6539ebcdfc3c86f19b6b69e1e3d57be8ad020868e584001752bac0d0b715c9db2a98d55b28674dc536a58fe364087907d7d12fc3521b068c9ec941fa5aa4f73d479acf2d2d189e64e15b1b8e", &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x3, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x101) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c81, r1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) write(r2, &(0x7f0000001e00)="f13fc2091551646c95bed55b6d1c5fc7c983e24cc257a9b30cbc28fed1", 0x1d) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='ipddp0\x00') r3 = open(&(0x7f0000000500)='./file0\x00', 0x610000, 0x38) r4 = accept4(r2, &(0x7f00000020c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002140)=0x80, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000580)={@dev={0xfe, 0x80, [], 0x18}, 0x1a, r5}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, r1) r6 = openat$cgroup_ro(r3, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r7 = syz_open_pts(r3, 0x8000) chmod(&(0x7f0000000540)='./file0/file0\x00', 0x17e) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001e40)={0x0}, &(0x7f0000001e80)=0xc) r9 = getpgrp(r8) process_vm_writev(r9, &(0x7f0000001c80)=[{&(0x7f0000000780)=""/200, 0xc8}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000880)=""/136, 0x88}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/210, 0xd2}, {&(0x7f0000000640)=""/57, 0xffe8}, {&(0x7f0000001a40)=""/239, 0xef}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/81, 0x51}], 0x9, &(0x7f0000000680)=[{&(0x7f0000001d40)=""/139, 0x72}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x3, 0x8000, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000003c0)={0x7f, 0xc1e1cd7b5eee9dd6, 0x3, 0x4, r10}, &(0x7f0000000400)=0x10) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f00000005c0)) r11 = request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000740)='ipddp0\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0x0, r11) getsockopt$inet_mreqn(r6, 0x0, 0x0, &(0x7f00000002c0)={@rand_addr, @remote}, &(0x7f0000000300)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) mlockall(0xfffffffffffffffc) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000440)=""/100, 0x64, 0x1, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}, 0xcf}, 0x10) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000627ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r12, 0x540d) 2018/04/07 04:24:54 executing program 6: unshare(0x24000200) unshare(0x20020000) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./control\x00', 0x1, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="02aff63ad7f47b454234b32f50b10e0d22325b1b2c96f2fcdc1cb795860c421074b373685d9b091099fabe0daff7ff04973007ce98bf3cc5e86266b71767193142e5ac74f6fce92582b927e088d4e4651c0fb7ecf495856fb8a522dbf62414ee8c391e0af3b264d80b3c4f3e27b10e84513056b7f84192cc9442c8c055bbfa5ecc283cf31e808c5f313a1b8acd5819551fae4eadf9", 0x95, 0x3}], 0x6, &(0x7f00000003c0)=ANY=[@ANYBLOB="6469725f756d61736b3d37322c6469725f756d61736b3d36332c66696c655f756d61736b3d30352c67697a04d3026769643d372c00"]) mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) mknodat(r0, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(r0, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040)=[&(0x7f0000000000)='eth1\x00'], 0x0) 2018/04/07 04:24:54 executing program 1: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000140), 0x10) mknodat(r0, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(r0, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040), 0x0) 2018/04/07 04:24:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="5b98698e0a53d9669b0998c04a348abc8aa5b26993263a48521c5f8430bd1e7cadc9090c72589a6b81af8170a8b0d7618e85f9f54c5368bf5975171801275df0fb2dc27239c86d6c736c946c034edc3caf8a1ff24ecb092f5d370493be03bcdbfa3fff87d34d2e6004b877f7e9d59cdcce88a0dadcdf27f25f7b6e5b4129191e1b2f8216e6bc1d0f9c73b0cc4e88b3f4adc03878b94cab3d12677eaca3119ca2829a29936d22413014b465ab525d30fa72338270c8", 0xb5}, {&(0x7f0000000300)="6c942e48d9174f5309c762d666ffb15241039ac722a295c3c4cb65216ad9b03365a592e610deabf71b3648cd9001e6b30c3b0a6cdf3fd22b661f230f0f4c7fb2a2a813d4e82dea63c504b780f0f720591cbf", 0x52}], 0x2, &(0x7f00000004c0)=[@iv={0xe8, 0x117, 0x2, 0xd4, "32fe1fd0d73a620590027826ae5872d4f3ed40896591c643a7a55c8addcb9f287485d035d18d5acf2f980f12606c50a089c59f688b26e7dcd3d3135c4e602f7caf645ea0c5f5ad37241de7de9bd6d66b9c703c401191125b5937bf8381ecc1c29ce1120ede4323c6586cb8e3cad914d5330b402659cc82254e2ed44a9c2811c43ddd3a23a919fd3f1a146d8600a2a7e60e2472193f3cdcdd08a6156696f588cf29a418e2e6403d8829168367be4512f5e6618f8d14e43c7db9ec5a3c82ff1626ebb71a4cc0e115f19a1d78120a9c49aa746cc6c7"}, @op={0x18, 0x117, 0x3}], 0x100}, 0x40000) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) write$tun(r0, &(0x7f000024a000), 0x32) ioctl(r0, 0x10000000000227c, &(0x7f0000000000)) 2018/04/07 04:24:55 executing program 1: mkdir(&(0x7f000000e000)='./control\x00', 0x0) r0 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000140), 0x10) mknodat(r0, &(0x7f000003f000)='./control\x00', 0x1, 0x0) execveat(r0, &(0x7f0000010000)='./control\x00', &(0x7f000003f000), &(0x7f0000000040), 0x0) 2018/04/07 04:24:55 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) tkill(r3, 0x16) 2018/04/07 04:24:55 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) tkill(r2, 0x16) 2018/04/07 04:24:55 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00005b1000)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}}}}}}, &(0x7f0000ea3000)) 2018/04/07 04:24:55 executing program 6: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000700)={&(0x7f0000ffb000/0x1000)=nil, 0x1000}) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) splice(r0, &(0x7f0000000040), r1, &(0x7f0000000200), 0xfffffffffffffffc, 0x8) r2 = openat(r1, &(0x7f0000000140)='./control\x00', 0x80000, 0x0) mkdirat(r1, &(0x7f0000000100)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000000)='./control/file0\x00', 0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000300)={0x1a}) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) mknodat(r0, &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff9) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x3}) dup3(r2, r1, 0x80000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000004c0)={r3, 0x80000, r2}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0x0, 0x1, 0x100000, 0x7, 0x1, 0x1, 0xff, 0x10000, 0x7, 0x80000001}) statfs(&(0x7f00000002c0)='./control/file0\x00', &(0x7f0000000380)=""/18) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000280)={r3}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000500)=[@in6={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x3}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x95, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0xfc, @local={0xfe, 0x80, [], 0xaa}, 0x538}, @in={0x2}, @in6={0xa, 0x4e22, 0x40, @mcast1={0xff, 0x1, [], 0x1}, 0x3}, @in={0x2, 0x4e20, @multicast1=0xe0000001}], 0xa0) 2018/04/07 04:24:55 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="64d745c5", 0x0) write(r0, &(0x7f0000000080)="164690f11220a8", 0x7) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) 2018/04/07 04:24:55 executing program 7: clone(0x0, &(0x7f0000000140)="bf67a48aee9d29fafc12d87d4ac7268b406f1cec55da3f0917d09b22fdda0057c7f079e80ab43c47f5a50e463946d6161abf2473ad6886d3c45377b3ee51969f03743263d02e94d943c74a0bcc5c8c86d6422255b8451c253dbeaeba4f1f1f784cec9025c1f1d163f0646ab614f51a970cf1873602ed270273ca6539ebcdfc3c86f19b6b69e1e3d57be8ad020868e584001752bac0d0b715c9db2a98d55b28674dc536a58fe364087907d7d12fc3521b068c9ec941fa5aa4f73d479acf2d2d189e64e15b1b8e", &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x3, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x101) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c81, r1) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) r2 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) write(r2, &(0x7f0000001e00)="f13fc2091551646c95bed55b6d1c5fc7c983e24cc257a9b30cbc28fed1", 0x1d) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='ipddp0\x00') r3 = open(&(0x7f0000000500)='./file0\x00', 0x610000, 0x38) r4 = accept4(r2, &(0x7f00000020c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002140)=0x80, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000580)={@dev={0xfe, 0x80, [], 0x18}, 0x1a, r5}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c80, r1) r6 = openat$cgroup_ro(r3, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) r7 = syz_open_pts(r3, 0x8000) chmod(&(0x7f0000000540)='./file0/file0\x00', 0x17e) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001e40)={0x0}, &(0x7f0000001e80)=0xc) r9 = getpgrp(r8) process_vm_writev(r9, &(0x7f0000001c80)=[{&(0x7f0000000780)=""/200, 0xc8}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000880)=""/136, 0x88}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/210, 0xd2}, {&(0x7f0000000640)=""/57, 0xffe8}, {&(0x7f0000001a40)=""/239, 0xef}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/81, 0x51}], 0x9, &(0x7f0000000680)=[{&(0x7f0000001d40)=""/139, 0x72}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x3, 0x8000, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f00000003c0)={0x7f, 0xc1e1cd7b5eee9dd6, 0x3, 0x4, r10}, &(0x7f0000000400)=0x10) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f00000005c0)) r11 = request_key(&(0x7f00000006c0)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000740)='ipddp0\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, 0x0, r11) getsockopt$inet_mreqn(r6, 0x0, 0x0, &(0x7f00000002c0)={@rand_addr, @remote}, &(0x7f0000000300)=0xc) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) mlockall(0xfffffffffffffffc) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000440)=""/100, 0x64, 0x1, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}, 0xcf}, 0x10) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000627ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(r12, 0x540d) 2018/04/07 04:24:55 executing program 3: pipe(&(0x7f0000160ff8)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000058ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r4, 0x10, 0x70bd2b, 0x25dfdbfc, {0x1}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000000)={0x7f, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40106435, &(0x7f0000000100)={0x4, r5, 0x1, 0x200}) vmsplice(r3, &(0x7f0000620000)=[{&(0x7f0000000040)="46023779dfcda3c02dba1062151dcda1a3d879301b394b173c555159a01389c4e3c4a8da522686c5aee5b4ed2aed4db9cc7982e79565d0e945d5354f359e2e7593e40f8fb02ea9705704e23e17e7be909a579f1062f63f1b2842cc7aed18a8f2c90a236f9235bd9eb7ae6664b08ff4aa952fcc9e98dfd575c34f2f30ae9437023dc38080b08f", 0x86}], 0x1, 0x0) openat(r0, &(0x7f0000000140)='./file0\x00', 0x40040, 0x1) fcntl$setpipe(r1, 0x407, 0x0) tee(r2, r1, 0x7, 0x0) vmsplice(r1, &(0x7f0000001300)=[{&(0x7f0000001200)="ef", 0x1}], 0x1, 0xa) msync(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3) 2018/04/07 04:24:55 executing program 1: mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) r0 = open$dir(&(0x7f0000000240)='./file0/bus/file0\x00', 0x10000, 0x1) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, &(0x7f0000000340)) mkdir(&(0x7f0000000100)='./file0/bus/file0\x00', 0x0) r3 = getuid() umount2(&(0x7f0000000300)='./file0/bus/file0\x00', 0x4) fcntl$setpipe(r1, 0x407, 0x100000001) fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000180)='./file0/bus/file0\x00', 0x108) chmod(&(0x7f00000002c0)='./file0\x00', 0x1) chown(&(0x7f0000000000)='./file0\x00', r3, r4) mkdir(&(0x7f00000003c0)='./file0/bus/file0\x00', 0x0) fcntl$setsig(r2, 0xa, 0x30) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/5, 0x5}, {&(0x7f0000000440)}, {&(0x7f0000000500)=""/171, 0xab}, {&(0x7f0000000480)=""/26, 0x1a}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x5, 0x0) write(r2, &(0x7f0000000440)="1996af8f", 0x4) symlinkat(&(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') 2018/04/07 04:24:56 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100), 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x200000000012}, &(0x7f0000044000)) close(r0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000200)) tkill(r1, 0x1000000000013) 2018/04/07 04:24:56 executing program 6: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x2, 0x0) setsockopt(r0, 0x0, 0x1, &(0x7f0000dfaff0)="010000000300", 0x6) r1 = socket$inet(0x2, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='erspan0\x00', 0x10) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="84", 0x1}], 0x1, &(0x7f0000000180)}, 0x40) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000040)) 2018/04/07 04:24:56 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}, 0x0, 0xff}, 0x0, @in=@broadcast=0xffffffff}}, 0xe8) close(r0) 2018/04/07 04:24:56 executing program 3: syz_emit_ethernet(0x22, &(0x7f0000000080)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [{[], {0x8100, 0x0, 0x7ff}}], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "6b84e6f3d156eb45"}}}}, &(0x7f0000000040)) inotify_init1(0x80000) 2018/04/07 04:24:56 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x0, 0x3, [0xffff, 0x9, 0x0]}, 0xe) wait4(0x0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) setsockopt$ax25_buf(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000340), 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) syz_open_procfs(r3, &(0x7f00000005c0)='gid_map\x00') tgkill(r3, 0x0, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x4e22, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0)}, 0x0) gettid() r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') read(r4, &(0x7f0000000240)=""/85, 0x55) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000100), 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x400}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000002c0)='/dev/sequencer\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[]) sendfile(r5, r4, &(0x7f0000000200), 0x200000010000) 2018/04/07 04:24:56 executing program 1: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000a40)='sysfs\x00', 0x0, &(0x7f0000cde000)) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='system.advise\x00', &(0x7f00000001c0)=""/146, 0x92) 2018/04/07 04:24:56 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000f25000), 0x4) 2018/04/07 04:24:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x10) pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000ac0), 0x4) bind$netlink(r1, &(0x7f0000437ff4)={0x10, 0x0, 0x0, 0xffffffffffeffffe}, 0xc) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000), 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000100)={{0x33, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e22, 0x3, 'nq\x00', 0x20, 0x1c0000, 0x23}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x0, 0x3, 0x7f1b, 0xa601}}, 0x44) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast2, @multicast2}, &(0x7f0000000080)=0xc) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f00000008c0)=ANY=[]}, 0x1}, 0x81) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000800)=0xe8) 2018/04/07 04:24:57 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) tkill(r3, 0x16) 2018/04/07 04:24:57 executing program 6: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x48, "1b074f12cc3532908f54e893761e739a415dfa17c9a4541e7c2104d1338caeda5002e21d7a2837bf8b4f4a3110c937c20b999ba01bbb5abe58a5004b23e30a1606aaac7e95e1fe58"}, &(0x7f00000007c0)=0x50) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000008c0)={0x0, 0x84, &(0x7f0000000800)=[@in6={0xa, 0x4e21, 0x266, @dev={0xfe, 0x80, [], 0xe}, 0x7}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x80000000}, @in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x5}]}, &(0x7f0000000900)=0x10) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents(r3, &(0x7f0000720fd4)=""/44, 0x1b3) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(r2, &(0x7f0000001d80)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r4, &(0x7f00000005c0)='syzkaller\x00', &(0x7f0000000600)='\x00') stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) modify_ldt$read(0x0, &(0x7f0000000b00)=""/100, 0xffffffffffffffc4) clone(0x8000, &(0x7f0000000140)="22f05c", &(0x7f0000000400), &(0x7f00000002c0), &(0x7f00000005c0)) open$dir(&(0x7f0000000200)='./file1\x00', 0xa8200, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)=ANY=[@ANYBLOB="1000e4002a00500109007000fcdbcff8"], 0x1}], 0x1, &(0x7f00000003c0)=ANY=[]}, 0x4000) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000100)="9e7a4769235b7a22804ee83413d1a4e05e8cabd9c82af9d274c30cd358b5b129c6e1c8a42b6b0b0a1e42f5be6da2da10a52c99", 0x33) syncfs(r2) rt_sigpending(&(0x7f00000009c0), 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'tunl0\x00', 0x3}, 0x18) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x1, 0x0, 0x7, 0x7, 0x8001, 0x0, 0x94fc, 0x1bcb}, 0xb) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000940)) 2018/04/07 04:24:57 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000ffbf47)=""/185, 0xfffffffffffffeba, 0x0, 0x0, 0xfffffffffffffde6) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x0, 0x3, [0xffff, 0x9, 0x0]}, 0xe) wait4(0x0, &(0x7f0000000100), 0x4, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sched_setscheduler(0x0, 0x5, &(0x7f0000000300)) setsockopt$ax25_buf(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000340), 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) syz_open_procfs(r3, &(0x7f00000005c0)='gid_map\x00') tgkill(r3, 0x0, 0x10) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@in={0x2, 0x4e22, @rand_addr=0x8}, 0x10, &(0x7f0000000480), 0x0, &(0x7f00000004c0)}, 0x0) gettid() r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') read(r4, &(0x7f0000000240)=""/85, 0x55) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000100), 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x400}, &(0x7f0000000380)=0x8) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000002c0)='/dev/sequencer\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[]) sendfile(r5, r4, &(0x7f0000000200), 0x200000010000) 2018/04/07 04:24:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:24:57 executing program 4: r0 = memfd_create(&(0x7f00000001c0)="64d745c5", 0x0) write(r0, &(0x7f0000000080)="164690f11220a8", 0x7) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) 2018/04/07 04:24:57 executing program 3: open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x82, 0x0) fallocate(r0, 0x11, 0x0, 0x8001) 2018/04/07 04:24:57 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) tkill(r2, 0x16) 2018/04/07 04:24:57 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) tkill(r2, 0x16) [ 61.110827] mmap: syz-executor1 (5310) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/07 04:24:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={"737cef07633f3f47713100", {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000003ac0)) connect$unix(r0, &(0x7f0000edfff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00009c5000), 0x4924967, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000040)=@ax25, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)=""/154}, {&(0x7f0000000180)=""/143}, {&(0x7f0000000240)=""/7}, {&(0x7f0000000280)=""/195}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/4096}, {&(0x7f00000013c0)=""/244}], 0x0, &(0x7f0000001540)=""/106, 0x0, 0x4}, 0x6}, {{&(0x7f00000015c0)=@pppol2tpv3in6, 0x0, &(0x7f0000001840)=[{&(0x7f0000001640)=""/219}, {&(0x7f0000001740)=""/254}], 0x0, &(0x7f0000001880)=""/70}}, {{&(0x7f0000001900)=@hci, 0x0, &(0x7f0000002d40)=[{&(0x7f0000001980)=""/146}, {&(0x7f0000001a40)=""/133}, {&(0x7f0000001b00)=""/253}, {&(0x7f0000001c00)=""/109}, {&(0x7f0000001c80)=""/66}, {&(0x7f0000001d00)=""/4096}, {&(0x7f0000002d00)=""/44}], 0x0, &(0x7f0000002dc0)=""/18, 0x0, 0x7}}, {{&(0x7f0000002e00)=@un=@abs, 0x0, &(0x7f00000030c0)=[{&(0x7f0000002e80)=""/156}, {&(0x7f0000002f40)=""/34}, {&(0x7f0000002f80)=""/146}, {&(0x7f0000003040)=""/32}, {&(0x7f0000003080)}], 0x0, 0x0, 0x0, 0x7fffffff}}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f0000003140)=""/177}, {&(0x7f0000003200)=""/200}, {&(0x7f0000003300)=""/98}, {&(0x7f0000003380)}, {&(0x7f00000033c0)=""/205}, {&(0x7f00000034c0)=""/196}, {&(0x7f00000035c0)=""/94}], 0x0, &(0x7f00000036c0)=""/251, 0x0, 0x4}, 0xba}], 0x3fffe1c, 0x3ffffffe, 0x0) 2018/04/07 04:24:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:24:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet6(0xa, 0x1, 0x3f, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x7c, 0x7ff, 0x8000000007}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e23, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x3, 0xffffffff, 0x401, 0x8, 0x830}, &(0x7f0000000180)=0x98) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000400)={@mcast1={0xff, 0x1, [], 0x1}}) 2018/04/07 04:24:57 executing program 6: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000740)={0x0, 0x48, "1b074f12cc3532908f54e893761e739a415dfa17c9a4541e7c2104d1338caeda5002e21d7a2837bf8b4f4a3110c937c20b999ba01bbb5abe58a5004b23e30a1606aaac7e95e1fe58"}, &(0x7f00000007c0)=0x50) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000008c0)={0x0, 0x84, &(0x7f0000000800)=[@in6={0xa, 0x4e21, 0x266, @dev={0xfe, 0x80, [], 0xe}, 0x7}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x80000000}, @in={0x2, 0x4e21, @loopback=0x7f000001}, @in={0x2, 0x4e24, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x5, @local={0xfe, 0x80, [], 0xaa}, 0x5}]}, &(0x7f0000000900)=0x10) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000480)="2f6578650000000000ff070000ddd9f191be10eebf000ee9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f349572d226d7a075fb35331ce39c5a3568641006d7c0206a74e333265316a175350e730ab2bce682b69d603fc05ead7fb5180de13a74155d8560fe23dfbba10724631067f955b8810f3402053f95a8798b0e3749d9c79cdd5f62547e59ab4352ab0a3827384665fd2c16ea53e5e2a1dc065b53520b9cd4eb30edc0f70cb82149f8ff5b628eabf1a9ab91915a78b5cb259f4a0fbfab4dacbd68f077") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00002e9000)='task\x00') getdents(r3, &(0x7f0000720fd4)=""/44, 0x1b3) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000380)=0xc) fstat(r2, &(0x7f0000001d80)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r4, &(0x7f00000005c0)='syzkaller\x00', &(0x7f0000000600)='\x00') stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) modify_ldt$read(0x0, &(0x7f0000000b00)=""/100, 0xffffffffffffffc4) clone(0x8000, &(0x7f0000000140)="22f05c", &(0x7f0000000400), &(0x7f00000002c0), &(0x7f00000005c0)) open$dir(&(0x7f0000000200)='./file1\x00', 0xa8200, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000026c0)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40108000}, 0xc, &(0x7f00000022c0)=[{&(0x7f0000000580)=ANY=[@ANYBLOB="1000e4002a00500109007000fcdbcff8"], 0x1}], 0x1, &(0x7f00000003c0)=ANY=[]}, 0x4000) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000000100)="9e7a4769235b7a22804ee83413d1a4e05e8cabd9c82af9d274c30cd358b5b129c6e1c8a42b6b0b0a1e42f5be6da2da10a52c99", 0x33) syncfs(r2) rt_sigpending(&(0x7f00000009c0), 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'tunl0\x00', 0x3}, 0x18) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0xfa, 0x1, 0x0, 0x7, 0x7, 0x8001, 0x0, 0x94fc, 0x1bcb}, 0xb) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000940)) 2018/04/07 04:24:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:24:57 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000f8ff4)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) r4 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r4, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f00000014c0)=""/101, 0x65}], 0x3) socket$inet_icmp(0x2, 0x2, 0x1) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000440), 0xc) write$cgroup_pid(r0, &(0x7f0000001680)={[0x32]}, 0x1) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f0000437ff4)={0x10}, 0xc) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000002600)) getpid() getuid() sendmsg$netlink(r9, &(0x7f0000000100)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x202e000}, 0xc, &(0x7f00000020c0)=[{&(0x7f0000002100)=ANY=[@ANYBLOB="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"], 0x1}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0xe2, [], 0x3b5, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)=""/226}, &(0x7f0000000380)=0x78) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0xfffffffffffffe55, &(0x7f0000000480)=""/32}) getuid() getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000001800)={r8}, &(0x7f0000001840)=0x8) socket$inet_tcp(0x2, 0x1, 0x0) preadv(r9, &(0x7f0000001d00)=[{&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f00000012c0)=""/108, 0x6c}, {&(0x7f00000018c0)=""/159, 0x9f}, {&(0x7f0000001980)=""/240, 0xf0}, {&(0x7f00000015c0)=""/72, 0x48}, {&(0x7f0000001a80)=""/191, 0xbf}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/100, 0x64}, {&(0x7f0000001bc0)=""/128, 0x80}, {&(0x7f0000001c40)=""/135, 0x87}], 0xa, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000011c0), &(0x7f0000001200)=0x4) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001280)={r1, r6, 0x5, 0x2}, 0x10) 2018/04/07 04:24:57 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:24:57 executing program 6: clone(0x0, &(0x7f0000000140)="bf67a48aee9d29fafc12d87d4ac7268b406f1cec55da3f0917d09b22fdda0057c7f079e80ab43c47f5a50e463946d6161abf2473ad6886d3c45377b3ee51969f03743263d02e94d943c74a0bcc5c8c86d6422255b8451c253dbeaeba4f1f1f784cec9025c1f1d163f0646ab614f51a970cf1873602ed270273ca6539ebcdfc3c86f19b6b69e1e3d57be8ad020868e584001752bac0", &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x101) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000140)='ipddp0\x00') r2 = open(&(0x7f0000000500)='./file0\x00', 0x610000, 0x38) accept4(r1, &(0x7f00000020c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002140)=0x80, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000002180)={@remote={0xfe, 0x80, [], 0xbb}, 0x1b, r3}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x3, 0x8000, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000003c0)={0x7f, 0xc1e1cd7b5eee9dd6, 0x3, 0x4, r5}, &(0x7f0000000400)=0x10) r6 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockname(r6, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) recvfrom$ax25(r6, &(0x7f0000000440)=""/100, 0x64, 0x0, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}, 0xcf}, 0x10) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000040)) clone(0x0, &(0x7f0000000080)="595781df5b683c4966614fc86952405ba9abf6698173a95d3e95733728c6fcd8e776e7d6a23db03839590d63a7598b36fe249564e5b77cecaa84fd201cc8e10d012dbaa06790a42d8a3f42", &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000040)) 2018/04/07 04:24:59 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) 2018/04/07 04:24:59 executing program 6: clone(0x0, &(0x7f0000000140)="bf67a48aee9d29fafc12d87d4ac7268b406f1cec55da3f0917d09b22fdda0057c7f079e80ab43c47f5a50e463946d6161abf2473ad6886d3c45377b3ee51969f03743263d02e94d943c74a0bcc5c8c86d6422255b8451c253dbeaeba4f1f1f784cec9025c1f1d163f0646ab614f51a970cf1873602ed270273ca6539ebcdfc3c86f19b6b69e1e3d57be8ad020868e584001752bac0", &(0x7f00002b7ffc), &(0x7f000029e000), &(0x7f0000000040)) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000180)=0x101) ioctl$LOOP_CTL_ADD(r0, 0x4c81, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000140)='ipddp0\x00') r2 = open(&(0x7f0000000500)='./file0\x00', 0x610000, 0x38) accept4(r1, &(0x7f00000020c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002140)=0x80, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000002180)={@remote={0xfe, 0x80, [], 0xbb}, 0x1b, r3}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x3, 0x8000, 0x3}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000003c0)={0x7f, 0xc1e1cd7b5eee9dd6, 0x3, 0x4, r5}, &(0x7f0000000400)=0x10) r6 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockname(r6, &(0x7f00000001c0)=@nl=@proc, &(0x7f0000000240)=0x80) recvfrom$ax25(r6, &(0x7f0000000440)=""/100, 0x64, 0x0, &(0x7f00000004c0)={0x3, {"6b66c1c95d3a78"}, 0xcf}, 0x10) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000040)) clone(0x0, &(0x7f0000000080)="595781df5b683c4966614fc86952405ba9abf6698173a95d3e95733728c6fcd8e776e7d6a23db03839590d63a7598b36fe249564e5b77cecaa84fd201cc8e10d012dbaa06790a42d8a3f42", &(0x7f0000000100), &(0x7f0000000000), &(0x7f0000000040)) 2018/04/07 04:24:59 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) read(r0, &(0x7f0000000040)=""/1, 0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = gettid() syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r2, 0x7) 2018/04/07 04:24:59 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000f8ff4)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f000001b000)={@multicast2=0xe0000002, @loopback=0x7f000001, @dev={0xac, 0x14}}, 0xc) r4 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r4, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f00000014c0)=""/101, 0x65}], 0x3) socket$inet_icmp(0x2, 0x2, 0x1) r5 = socket(0x10, 0x803, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000440), 0xc) write$cgroup_pid(r0, &(0x7f0000001680)={[0x32]}, 0x1) r9 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r9, &(0x7f0000437ff4)={0x10}, 0xc) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000002600)) getpid() getuid() sendmsg$netlink(r9, &(0x7f0000000100)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x202e000}, 0xc, &(0x7f00000020c0)=[{&(0x7f0000002100)=ANY=[@ANYBLOB="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"], 0x1}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r5, 0x0, 0x83, &(0x7f0000000300)={'nat\x00', 0x0, 0x0, 0xe2, [], 0x3b5, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000200)=""/226}, &(0x7f0000000380)=0x78) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000180)={0xfffffffffffffe55, &(0x7f0000000480)=""/32}) getuid() getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000001800)={r8}, &(0x7f0000001840)=0x8) socket$inet_tcp(0x2, 0x1, 0x0) preadv(r9, &(0x7f0000001d00)=[{&(0x7f00000000c0)=""/22, 0x16}, {&(0x7f00000012c0)=""/108, 0x6c}, {&(0x7f00000018c0)=""/159, 0x9f}, {&(0x7f0000001980)=""/240, 0xf0}, {&(0x7f00000015c0)=""/72, 0x48}, {&(0x7f0000001a80)=""/191, 0xbf}, {&(0x7f0000002900)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/100, 0x64}, {&(0x7f0000001bc0)=""/128, 0x80}, {&(0x7f0000001c40)=""/135, 0x87}], 0xa, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000011c0), &(0x7f0000001200)=0x4) sendto(r5, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001280)={r1, r6, 0x5, 0x2}, 0x10) 2018/04/07 04:24:59 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) tkill(r2, 0x16) 2018/04/07 04:24:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000bd5000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000115fe0)={0x1}) fcntl$lock(r1, 0x26, &(0x7f000001d000)) dup2(r0, r1) getcwd(&(0x7f0000000080)=""/4096, 0x1000) 2018/04/07 04:24:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0xffffffff00000001, 0x7}) name_to_handle_at(r0, &(0x7f00002e4000)='./file0\x00', &(0x7f0000000080)={0x8}, &(0x7f0000000000), 0x1400) 2018/04/07 04:24:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(ctr-aes-aesni,poly1305-generic)\x00'}, 0x58) r1 = dup2(r0, r0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000080)="b15b72dfd342f6a76b630bc7449fc767c464913682bfc2191d09ea7c410a717a629bdb988e691a087031bd25baa11cb37fcccd487876381fa78a8aeea55793bfe5045aa63a302f5db14dc24375e1ad8911a9f54b7c6fededc1", 0x59) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) 2018/04/07 04:24:59 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x2040, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, "13"}, 0x0) 2018/04/07 04:24:59 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') setsockopt(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000016c0)="25e11ed4c2e46decc38ec698f32088c63e71595cf82bb870df3e90c0e584b736d1437b75186df94dd4ba7c53b232ac18ca05174edeea010eda80ec55c7a8793362d3c23be5492992e9d8b11a979a49ec6eee2760feac3d6a64df5366f8b4616d44db0e2b1187d2513b43f65db37cd67451e2e499949fc538f46e36957699f92e504dc46de180453845fdf542cbb9725a77881ec7aed6aad5a29e6f1b250401c4b325b4f9bff1e34303241a4ac6bab27cbedc3f4e1856b430a92d92982008eb08a2d6b0e8b621ec50fda2273fd3965965a70e03949052e498195e", 0xda) chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98fa", 0x9e}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x0, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r4, 0x4, 0x6000) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:25:00 executing program 6: ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000280), &(0x7f00000002c0)=0x1c) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = socket$inet6(0xa, 0x0, 0x88) socket$inet6(0xa, 0x3, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000100), 0x4) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140), &(0x7f00000001c0)=0x4) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f00000004c0), 0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x3ff, 0x3}, 0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={'bond0\x00', @ifru_mtu}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000c7e000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x7, &(0x7f0000663000), 0x4) r4 = epoll_create1(0x0) shutdown(r2, 0x1) sendto(r3, &(0x7f0000199fc9)='=', 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000bd000)) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000003c0)={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1c) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r6, 0x400) sendto$inet6(r5, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) accept4$inet6(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r7, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2048200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x84, 0x0, 0x1, 0x0, 0x25dfdbfe, {0xf}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xd9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x17}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000004) 2018/04/07 04:25:00 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x200004a, 0x100000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) mkdir(&(0x7f0000042ff6)='./control\x00', 0x0) inotify_add_watch(r0, &(0x7f000003a000)='./control\x00', 0x20) creat(&(0x7f0000fc7000)='./control/file0\x00', 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/04/07 04:25:00 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2, 0x4e20}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000001c0)}}, {{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000080)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 2018/04/07 04:25:00 executing program 1: r0 = memfd_create(&(0x7f0000000040)='cgroup%*!^}eth1vboxnet1procvboxnet1ppp0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x10ed5b) 2018/04/07 04:25:00 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) r1 = timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) r4 = fcntl$getown(r3, 0x9) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x0, 0x8a81, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xb14, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x46, 0x7f, 0x9, 0x0, 0x100000001, 0x0, 0x7fff, 0x0, 0x8, 0x9, 0x0, 0x0, 0x20000, 0x3f, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000040)}, 0x200, 0x100000001, 0xe1a, 0x0, 0xffffffffffffffc0}, r4, 0xb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) unshare(0x20000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r7 = syz_open_procfs(r6, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f00000002c0), 0x4) getsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(r5, r1) openat$cgroup_ro(r7, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) 2018/04/07 04:25:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') setsockopt(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000016c0)="25e11ed4c2e46decc38ec698f32088c63e71595cf82bb870df3e90c0e584b736d1437b75186df94dd4ba7c53b232ac18ca05174edeea010eda80ec55c7a8793362d3c23be5492992e9d8b11a979a49ec6eee2760feac3d6a64df5366f8b4616d44db0e2b1187d2513b43f65db37cd67451e2e499949fc538f46e36957699f92e504dc46de180453845fdf542cbb9725a77881ec7aed6aad5a29e6f1b250401c4b325b4f9bff1e34303241a4ac6bab27cbedc3f4e1856b430a92d92982008eb08a2d6b0e8b621ec50fda2273fd3965965a70e03949052e498195e", 0xda) chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)={0x0, 0x0}) rt_sigqueueinfo(r3, 0x0, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r4, 0x4, 0x6000) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:25:00 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) 2018/04/07 04:25:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') setsockopt(0xffffffffffffffff, 0x0, 0x4, &(0x7f00000016c0)="25e11ed4c2e46decc38ec698f32088c63e71595cf82bb870df3e90c0e584b736d1437b75186df94dd4ba7c53b232ac18ca05174edeea010eda80ec55c7a8793362d3c23be5492992e9d8b11a979a49ec6eee2760feac3d6a64df5366f8b4616d44db0e2b1187d2513b43f65db37cd67451e2e499949fc538f46e36957699f92e504dc46de180453845fdf542cbb9725a77881ec7aed6aad5a29e6f1b250401c4b325b4f9bff1e34303241a4ac6bab27cbedc3f4e1856b430a92d92982008eb08a2d6b0e8b621ec50fda2273fd3965965a70e03949052e498195e", 0xda) chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(r1, 0x8000) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000017c0)="1197aaa2fa02d3a264db9c54d3f31b613fde4afe4650da56a0f9ea18ae17ba533e86b33bb22a040ec422bd5c9f38dea73a1c9affa92317c06fc2fc11315d3b5194580f536717b0bcd38069293b6bda862a14f66da12b20d852c5f95890340334d23bc4bfc84420004a91fdb8169be6afd317f2b4131da91656b915b7464ee6789db4eaf502907ea7f8158c5f8dd7f16a528bf0ca5ba8dbfc388c512b98faf32fbee53b5819d7a57b6e102f63ac8eba9b4b30be11c6b4de9aa18b69a8f8fca92911c560ee4514f15f43b5eba3f8b3479aab47", 0xd2}], 0x1, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000014c0)=ANY=[@ANYBLOB="6f6378d093c440f74fbeb57f289baf481251c3f4f1ca560b0128c55085f6616b87d6c19eab090029a72d5d12f250a2d5ad50326ccfd058aee2c060f463b4509074b465a3fe9e0a9cb1fb27206d164a1761499c89f0348b6c086d4f7082fd6e1bf380507fd91e4552342b05d8bcc9061506c47d28526ca3e2180f9a554f4173a62a29ab9b034ec9d01fa9555c635ea36a99f9e19e85a571a9c2e034649b"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(r1, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r2, 0x10, &(0x7f0000001240)) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") creat(&(0x7f0000001580)='./file0\x00', 0x8000000000011) fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 2018/04/07 04:25:00 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x27, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x3}) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000c8e000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000780000/0x2000)=nil) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/07 04:25:00 executing program 7: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x200000000008002) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x27, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x3}) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000c8e000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000780000/0x2000)=nil) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/07 04:25:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='sessionid\x00') read(r0, &(0x7f00000001c0)=""/45, 0x2d) 2018/04/07 04:25:00 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) tkill(r2, 0x16) 2018/04/07 04:25:00 executing program 6: mkdir(&(0x7f0000074ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='sysfs\x00', 0x81, &(0x7f0000ebcffe)) rename(&(0x7f00000004c0)='./file0/bus\x00', &(0x7f0000000380)='./file0/file0\x00') 2018/04/07 04:25:00 executing program 5: r0 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000540), 0x8, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f000006b000/0x800000)=nil, 0x800000, 0x0, &(0x7f00008a0000), 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r0, 0x0) remap_file_pages(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 2018/04/07 04:25:00 executing program 6: getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000fcf000)='/dev/input/event#\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="bba1c8c8aa8ebe1f28529df958ccf124bb9dc2e27ea1c0971919db703a4c74c627be15ff0ffcbba8768faa203b508588dd73b43757fbe671baafb41b9b32c08ede6f00b8cbf5c4e44d9a5a0972474cea2d20044c341d8706be800a199f380966b09e8b0f8f956723b589839a94aa3132d1e8d0a2ce56a7224c9ddaaaf65c60b8d82692e4413f95134974d7405fcf9fa051f5aa0aa3a53030292569ee1740b9f0f3461da513f4b0d02559305f88e937c4b893f6f5", 0xb4, 0xfffffffffffffffb) getsockname(r1, &(0x7f0000000600)=@ipx, &(0x7f0000000680)=0x80) r4 = request_key(&(0x7f0000000500)='dns_resolver\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000580)='$!\x00', 0xfffffffffffffffb) keyctl$unlink(0x9, r3, r4) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000005c0)={0x2, 0x3f, 0xffffffffffffffed, 0x8, 0x9, 0x7, 0x7ff, 0x400, 0xfe2, 0x4, 0x0, 0x3ff}) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xde}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000f31000)={0x0, 0x0, &(0x7f00005e3f1e)}) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10}, 0xfffffffffffffde2) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') dup3(r5, r0, 0x0) 2018/04/07 04:25:00 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000ff8), 0x8) r1 = timerfd_create(0x0, 0x0) unshare(0x20000400) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f00001da000), 0x8}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0xe86824d2c1c833cb}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) r4 = fcntl$getown(r3, 0x9) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x2, 0x0, 0x8a81, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xb14, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x46, 0x7f, 0x9, 0x0, 0x100000001, 0x0, 0x7fff, 0x0, 0x8, 0x9, 0x0, 0x0, 0x20000, 0x3f, 0x0, 0x7f, 0x1, @perf_bp={&(0x7f0000000040)}, 0x200, 0x100000001, 0xe1a, 0x0, 0xffffffffffffffc0}, r4, 0xb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a3c000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) open(&(0x7f0000000300)='./file0\x00', 0x2, 0x0) unshare(0x20000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r7 = syz_open_procfs(r6, &(0x7f00000003c0)="6e732f6d6e740077089d5475570ba400e5756418d9bae5b4d0b7e13f38b65692230260de869e31e55400709b225bebe4434f8060ab131dfc2d76e661d84f17c4de706501f8821fbcec24859915779583cda2c3") setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f00000002c0), 0x4) getsockopt$netrom_NETROM_T4(r7, 0x103, 0x6, &(0x7f0000000200)=0x7, &(0x7f0000000240)=0x4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) clone(0x30000100, &(0x7f0000e69000), &(0x7f00009c4ffc), &(0x7f00001cc000), &(0x7f0000a46000)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(r5, r1) openat$cgroup_ro(r7, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=""/128, &(0x7f0000000180)=0x80) 2018/04/07 04:25:00 executing program 5: r0 = perf_event_open(&(0x7f000002ef88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000540), 0x8, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f000006b000/0x800000)=nil, 0x800000, 0x0, &(0x7f00008a0000), 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) mmap(&(0x7f0000029000/0x3000)=nil, 0x3000, 0x0, 0x51, r0, 0x0) remap_file_pages(&(0x7f0000029000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 2018/04/07 04:25:01 executing program 1: fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) alarm(0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x8c, 0x0, 0x100, 0x70bd29, 0x0, {0xe}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x8c}, 0x1}, 0x8000) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3]}, &(0x7f0000000100)=0x100) rt_sigqueueinfo(0x0, 0x38, &(0x7f0000001280)={0x0, 0x0, 0xfffffffeffffffff, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_names\x00') fcntl$setstatus(r2, 0x4, 0x0) pread64(r2, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) 2018/04/07 04:25:01 executing program 5: fchdir(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040), 0xc) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0) alarm(0xfffffffffffffffe) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) unlink(&(0x7f0000001300)='./file1\x00') chdir(&(0x7f0000f95000)='./file0\x00') pwritev(0xffffffffffffffff, &(0x7f0000001580), 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x8000) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000012c0)=@sack_info={0x0, 0x0, 0x8}, &(0x7f0000001340)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000016c0)=@assoc_id=r1, 0x4) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) pwritev(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f00000013c0)=""/196, 0xc4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000015c0)={0x0, @in6={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0xec26}}, [0x0, 0x0, 0x7, 0x6, 0x1, 0x3, 0x0, 0x0, 0x5c, 0x1, 0x7f, 0x0, 0x3, 0x7, 0x400]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x20) open(&(0x7f0000001380)='./file0\x00', 0x10002, 0x20) read(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000) fcntl$getownex(r0, 0x10, &(0x7f0000001240)={0x0, 0x0}) rt_sigqueueinfo(r2, 0x38, &(0x7f0000001280)={0x1d, 0x0, 0xfffffffeffffffff, 0x4}) r3 = syz_open_procfs(r2, &(0x7f0000000200)='net/ip6_tables_names\x00') fcntl$setstatus(r3, 0x4, 0x6000) pread64(r3, &(0x7f0000001880)=""/4096, 0x1264, 0x3) 2018/04/07 04:25:01 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getgroups(0x5, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) getgroups(0x1, &(0x7f0000000380)=[0x0]) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r1 = getgid() ioctl$TUNSETGROUP(r0, 0x400454ce, r1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r2 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) dup2(r0, r2) 2018/04/07 04:25:01 executing program 6: getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000fcf000)='/dev/input/event#\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="bba1c8c8aa8ebe1f28529df958ccf124bb9dc2e27ea1c0971919db703a4c74c627be15ff0ffcbba8768faa203b508588dd73b43757fbe671baafb41b9b32c08ede6f00b8cbf5c4e44d9a5a0972474cea2d20044c341d8706be800a199f380966b09e8b0f8f956723b589839a94aa3132d1e8d0a2ce56a7224c9ddaaaf65c60b8d82692e4413f95134974d7405fcf9fa051f5aa0aa3a53030292569ee1740b9f0f3461da513f4b0d02559305f88e937c4b893f6f5", 0xb4, 0xfffffffffffffffb) getsockname(r1, &(0x7f0000000600)=@ipx, &(0x7f0000000680)=0x80) r4 = request_key(&(0x7f0000000500)='dns_resolver\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000580)='$!\x00', 0xfffffffffffffffb) keyctl$unlink(0x9, r3, r4) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000005c0)={0x2, 0x3f, 0xffffffffffffffed, 0x8, 0x9, 0x7, 0x7ff, 0x400, 0xfe2, 0x4, 0x0, 0x3ff}) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x84, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xde}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000f31000)={0x0, 0x0, &(0x7f00005e3f1e)}) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10}, 0xfffffffffffffde2) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') dup3(r5, r0, 0x0) 2018/04/07 04:25:01 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1000000000010, 0x2, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000223000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x5}}, &(0x7f0000005fe0)) timerfd_gettime(r0, &(0x7f000069cfe0)) 2018/04/07 04:25:01 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000421000), 0x8) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000633000)='/dev/ptmx\x00', 0x0, 0x0) read(r2, &(0x7f0000532000)=""/1, 0x1) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r5}], 0x1, 0xfffffffffffffff8) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000001200)={0x9, 0x100, 0x1f, 0x3, 0xff, 0x4, 0x92, 0x3e16, 0x40, 0x401}) r6 = dup2(r4, r5) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000f38ffc)) poll(&(0x7f0000001080)=[{r1}, {r5}, {r2}], 0x3, 0xfffffffffffffff8) fcntl$setown(r6, 0x8, r3) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000010c0)={0x0, 0x5}, &(0x7f0000001100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x1b, &(0x7f0000001140)={r8, 0x44, "31552003c624bffaa2c75c975d7646e1688569ac0728746062d0be8aa7490e9c39d5d5678eeffd04c9fe33d2c891075948994ed44635729e82e34b9067b42c8c372a0aba"}, &(0x7f00000011c0)=0x4c) 2018/04/07 04:25:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@dev, @remote, 0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'rose0\x00', r1}) add_key(&(0x7f0000000540)="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", &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000400)="30800a2e", 0x4, 0xfffffffffffffffd) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r2 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x0, 0x5d, &(0x7f0000000080)="0a9ed084a62dc034853f93038454edf63455b5d6e2d20ceed9b96139beebdd11568c514670fb125bee8c89389a55e60b1eae25d2599b1e15ccf7dd7a97257b9fee2e81a476fe00d57a4caea20932c89a5282b40909f8f7a31534aeb2ae"}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000280)={0x17, 0xb, &(0x7f0000000240)="cbe7c4f3d760035e83ca12"}) io_setup(0x80000000, &(0x7f00000002c0)=0x0) io_cancel(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xf, 0xffff, r2, &(0x7f0000000300)="92de40cd1d705c433b9f2a9a0a94b99da9ffc75c3b32adb5e6f11955087cab6cb949dd6f27cc0dafca0602fbacf391403b61598579e5600675815d183a134a6c554e8f2abad90e8fab6fe604b34c66740f16dc1f6ab231b7db35b0efc65f47cd2f8d2778d2df996f39f516aa3f79380bacdf34f6a82b84bc6025fe69bbc79649b0", 0x81, 0x3, 0x0, 0x1, r2}, &(0x7f0000000440)) 2018/04/07 04:25:01 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) fdatasync(r1) rmdir(&(0x7f0000000080)='./file0\x00') r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x20000000000000) open_by_handle_at(r0, &(0x7f0000000200)={0xa0, 0x7, "d587c655a9adea552fcec38e8cfe60ed3cb3454eb4661d3725eac145afd8392326ae45cf0c21d197cd271832a5fa6e57bd52057c8e8ad0a0414766854b9b5e57f33c712c2f4713048098342172b1c37359e2f2576ecb8dc1fea11e4ba2d60a39cbc81434891975ae362847644b6f88e572db0dd17a205de06f475d71cccb206d19b13f9207e11cf29a643640da6b904735d04640e6b98260"}, 0x20800) r3 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x1fffe, 0x0) ftruncate(r3, 0x8001) r4 = open$dir(&(0x7f0000000500)='./file0\x00', 0x2, 0x0) ftruncate(r1, 0x3) lseek(0xffffffffffffffff, 0x0, 0x3) write(r4, &(0x7f0000000300)="d88a8d38144e5013d473c0ac2ca61ff3b749a4f5c7e6e9c2ce586e5cfca5d60ffc9a4df71856925b300ab39b1dd592385821faecb039bcdc475ffbacb982187073fc479f1cc6ffa0000af0026e75921d8a8310071ec28e0e6292680755e470aa73f538545ff8b19c257d032f9da1fa51f9a41568ce04a04f48d13d59ef80d3419c", 0x81) tee(0xffffffffffffffff, r1, 0x0, 0x2) syncfs(r3) pwritev(r3, &(0x7f00000002c0)=[{&(0x7f0000000540)}], 0x1, 0x0) splice(r4, &(0x7f0000000000), r1, &(0x7f00000004c0), 0x7, 0x2) sendfile(r4, r3, &(0x7f0000000180), 0x12000) fdatasync(r2) syz_mount_image$vfat(&(0x7f0000001640)='vfat\x00', &(0x7f0000001680)='./file0\x00', 0x200, 0x1, &(0x7f0000002900)=[{&(0x7f00000016c0)="cf029ff80a1c57176fcec2ab1bff3e9ffbe0d31231540853608f9da1c7222aad36e440f9ff9e69b8e53ae45dc736ca700022dc4ec4", 0x35, 0x9}], 0x1001, &(0x7f0000002980)) name_to_handle_at(r2, &(0x7f0000002d00)='./file0\x00', &(0x7f0000002e40)=ANY=[@ANYBLOB="9a000000040000001045f2e90b19709a8787351b8b1f8104f97b77fd6c3a99af823eb540a04833cad551a1b11f312b7c6383ecb35894deff6b322523c5f442e2f47d89e3dd5d578407adc92a1934a2bfed7efeec3d2887e585a9ce06c6a6413d4450863856dbbbf2b6ca529d6e9871515828eba9db9dcc7d206eb2e71d9f000468a026b32928818d1bdc2d8c85f833654d49551168a3d6b16f9fea7519cd20f1db205511281c242e973c71e569"], &(0x7f0000002e00), 0x1400) lookup_dcookie(0x7, &(0x7f0000001540)=""/249, 0xf9) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000540)=0x5) pwritev(r4, &(0x7f0000002cc0)=[{&(0x7f00000029c0)="111cbe3291187171ac60bb9d2ddc1b23875d91c22984094d6e579d0e201b5c4df58bbb6e228155a4641521df6aeb1a3d8eccbbc4db1d2799ebe5f07b154cfb14af1a78d4dc84aa2fd3b1132f8340d658d173e19fb8edeacd55d937c3012b55086acf9c4d55be8a6323c8e27b8c775c2ffc7e3a26ced3af3580d3fab0f57fe916312601c3a573f7c59ab1f8f965928e65696772eaef388371d87575f9d37cc9bd96bbce78506cfe42eaa01fc778e5b2313ed0dedbd144c1df06ea", 0xba}], 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f00000003c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="456655db142b0600750e5c0aff3b50ab1819d59e912310af2c87b1ee984e09e2b6679e58d9b46d9b575949cd9f2122360a1143d054c4933a903b8f291d32564926a69aadeffc1ecc", 0x48, 0x3}], 0x0, &(0x7f0000002700)=ANY=[]) fdatasync(r4) fdatasync(r3) pipe(&(0x7f0000002740)) ftruncate(r2, 0x3) 2018/04/07 04:25:01 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000), 0x10) 2018/04/07 04:25:01 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') dup3(r0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001200)=""/236, 0xec) 2018/04/07 04:25:01 executing program 7: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x200000000008002) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x27, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x3}) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000c8e000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000780000/0x2000)=nil) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/04/07 04:25:01 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000000)=0xbd3, 0x77) bind$inet(r1, &(0x7f00000f0ff0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto(r1, &(0x7f000077e000)="e7", 0x1, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000002440)=[{&(0x7f0000000140)=""/88, 0x58}], 0x1) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) 2018/04/07 04:25:01 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x27, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x3}) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) mremap(&(0x7f0000c8e000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000780000/0x2000)=nil) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 66.776155] ================================================================== [ 66.783560] BUG: KMSAN: uninit-value in kernel_text_address+0x248/0x3a0 [ 66.790306] CPU: 1 PID: 5558 Comm: syz-executor6 Not tainted 4.16.0+ #81 [ 66.797126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.806459] Call Trace: [ 66.809042] dump_stack+0x185/0x1d0 [ 66.812659] ? kernel_text_address+0x248/0x3a0 [ 66.817227] kmsan_report+0x142/0x240 [ 66.821014] __msan_warning_32+0x6c/0xb0 [ 66.825063] kernel_text_address+0x248/0x3a0 [ 66.829463] ? save_stack_trace_tsk+0x258/0x2f0 [ 66.834119] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 66.839473] ? save_stack_trace_tsk+0x258/0x2f0 [ 66.844132] __kernel_text_address+0x34/0xe0 [ 66.848532] ? save_stack_trace_tsk+0x258/0x2f0 [ 66.853193] unwind_get_return_address+0x8c/0x130 [ 66.858028] __save_stack_trace+0x45c/0xa80 [ 66.862341] ? save_stack_trace_tsk+0x258/0x2f0 [ 66.867001] ? __msan_poison_alloca+0x15c/0x1d0 [ 66.871660] ? save_stack_trace_tsk+0x58/0x2f0 [ 66.876234] save_stack_trace_tsk+0x258/0x2f0 [ 66.880719] proc_pid_stack+0x26a/0x470 [ 66.884685] proc_single_show+0x1af/0x300 [ 66.888817] ? proc_pid_wchan+0x250/0x250 [ 66.892953] ? proc_single_open+0x90/0x90 [ 66.897089] seq_read+0xc7d/0x2260 [ 66.900625] ? __vfs_read+0xc6/0x8e0 [ 66.904327] ? seq_open+0x360/0x360 [ 66.907938] __vfs_read+0x19f/0x8e0 [ 66.911558] vfs_read+0x36c/0x6c0 [ 66.915007] SYSC_read+0x172/0x360 [ 66.918541] SyS_read+0x55/0x80 [ 66.921809] do_syscall_64+0x309/0x430 [ 66.925686] ? vfs_write+0x8d0/0x8d0 [ 66.929390] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 66.934566] RIP: 0033:0x455259 [ 66.937743] RSP: 002b:00007f6d3c2c7c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 66.945440] RAX: ffffffffffffffda RBX: 00007f6d3c2c86d4 RCX: 0000000000455259 [ 66.952692] RDX: 00000000000000ec RSI: 0000000020001200 RDI: 0000000000000015 [ 66.959946] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 66.967203] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 66.974456] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000001 [ 66.981714] [ 66.983326] Uninit was stored to memory at: [ 66.987635] kmsan_internal_chain_origin+0x12b/0x210 [ 66.992723] __msan_chain_origin+0x69/0xc0 [ 66.996947] update_stack_state+0x959/0xa40 [ 67.001259] unwind_next_frame+0x618/0xe50 [ 67.005480] __unwind_start+0x508/0x630 [ 67.009441] __save_stack_trace+0x3e1/0xa80 [ 67.013751] save_stack_trace_tsk+0x258/0x2f0 [ 67.018234] proc_pid_stack+0x26a/0x470 [ 67.022199] proc_single_show+0x1af/0x300 [ 67.026333] seq_read+0xc7d/0x2260 [ 67.029861] __vfs_read+0x19f/0x8e0 [ 67.033472] vfs_read+0x36c/0x6c0 [ 67.036909] SYSC_read+0x172/0x360 [ 67.040433] SyS_read+0x55/0x80 [ 67.043698] do_syscall_64+0x309/0x430 [ 67.047575] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.052746] Local variable description: ----timeout@futex_wait [ 67.058691] Variable was created at: [ 67.062390] futex_wait+0xde/0xc20 [ 67.065914] do_futex+0x284a/0x6ad0 [ 67.069521] ================================================================== [ 67.076856] Disabling lock debugging due to kernel taint [ 67.082284] Kernel panic - not syncing: panic_on_warn set ... [ 67.082284] [ 67.089637] CPU: 1 PID: 5558 Comm: syz-executor6 Tainted: G B 4.16.0+ #81 [ 67.097761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.107098] Call Trace: [ 67.109677] dump_stack+0x185/0x1d0 [ 67.113293] panic+0x39d/0x940 [ 67.116492] ? kernel_text_address+0x248/0x3a0 [ 67.121070] kmsan_report+0x238/0x240 [ 67.124863] __msan_warning_32+0x6c/0xb0 [ 67.128911] kernel_text_address+0x248/0x3a0 [ 67.133309] ? save_stack_trace_tsk+0x258/0x2f0 [ 67.137966] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 67.143323] ? save_stack_trace_tsk+0x258/0x2f0 [ 67.147981] __kernel_text_address+0x34/0xe0 [ 67.152379] ? save_stack_trace_tsk+0x258/0x2f0 [ 67.157043] unwind_get_return_address+0x8c/0x130 [ 67.161879] __save_stack_trace+0x45c/0xa80 [ 67.166193] ? save_stack_trace_tsk+0x258/0x2f0 [ 67.170852] ? __msan_poison_alloca+0x15c/0x1d0 [ 67.175508] ? save_stack_trace_tsk+0x58/0x2f0 [ 67.180083] save_stack_trace_tsk+0x258/0x2f0 [ 67.184569] proc_pid_stack+0x26a/0x470 [ 67.188534] proc_single_show+0x1af/0x300 [ 67.192676] ? proc_pid_wchan+0x250/0x250 [ 67.196808] ? proc_single_open+0x90/0x90 [ 67.200946] seq_read+0xc7d/0x2260 [ 67.204484] ? __vfs_read+0xc6/0x8e0 [ 67.208188] ? seq_open+0x360/0x360 [ 67.211799] __vfs_read+0x19f/0x8e0 [ 67.215421] vfs_read+0x36c/0x6c0 [ 67.218869] SYSC_read+0x172/0x360 [ 67.222403] SyS_read+0x55/0x80 [ 67.225670] do_syscall_64+0x309/0x430 [ 67.229548] ? vfs_write+0x8d0/0x8d0 [ 67.233256] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 67.238431] RIP: 0033:0x455259 [ 67.241604] RSP: 002b:00007f6d3c2c7c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 67.249298] RAX: ffffffffffffffda RBX: 00007f6d3c2c86d4 RCX: 0000000000455259 [ 67.256559] RDX: 00000000000000ec RSI: 0000000020001200 RDI: 0000000000000015 [ 67.263813] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 67.271068] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 67.278325] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000001 [ 68.404935] Shutting down cpus with NMI [ 68.420595] Dumping ftrace buffer: [ 68.424122] (ftrace buffer empty) [ 68.427811] Kernel Offset: disabled [ 68.431426] Rebooting in 86400 seconds..