(0x7f0000000000)=""/231, 0xe7) 2018/04/13 10:18:51 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x84000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000100)={0x40, @tick, 0x8000, {0x9, 0x81}, 0x8fd, 0x1, 0x200}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0xffffffffffffff76, 0x1000}, 'port0\x00', 0x40, 0x0, 0x0, 0x3f, 0x81, 0x6, 0x6, 0x0, 0x1, 0x2}) 2018/04/13 10:18:51 executing program 1: r0 = geteuid() r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x501000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0xffffffffffffff81, 0xa5a}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e23, @multicast2=0xe0000002}}, [0x4, 0x81, 0x7fffffff, 0x1, 0x7, 0x9, 0xffffffff, 0x6, 0x401, 0x80000001, 0x80000000, 0x1, 0x0, 0x1f, 0x7]}, &(0x7f00000001c0)=0x100) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x8, r0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 2018/04/13 10:18:51 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x5}) r0 = getpgrp(0x0) sched_setparam(r0, &(0x7f0000000000)=0x3f) 2018/04/13 10:18:51 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0xfffffffffffffffd}, 0x0, 0xffffffffffffffff}) 2018/04/13 10:18:51 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) shmget(0x3, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) 2018/04/13 10:18:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 1: r0 = request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='eth0!blo+}posix_acl_accessusercpuset\x00', 0xffffffffffffffff) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$reject(0x13, r0, 0x6ec, 0x800, r0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x1}) 2018/04/13 10:18:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) 2018/04/13 10:18:52 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x10, 0x80400000802, 0x0) write(r2, &(0x7f0000af7000)="240000001a0025f00000000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 1: r0 = msgget$private(0x0, 0x1c) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000002c0)=""/145) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x3d98bfd9ea448732) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000200)=0x54) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xc8, r2, 0x500, 0x70bd29, 0x25dfdbfd, {0xf}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x29}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3cbe}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1b, 0x2}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8001}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4008080}, 0x4000084) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r3 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r3, 0x0) 2018/04/13 10:18:52 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 0: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:52 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:18:52 executing program 0: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3f, 0x20000) r1 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fcntl$getown(0xffffffffffffff9c, 0x9) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000001500), &(0x7f0000001540)=0xe, 0x80000) r10 = socket$bt_cmtp(0x1f, 0x3, 0x5) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000007740)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = signalfd(0xffffffffffffff9c, &(0x7f0000001580)={0x1ff}, 0xffffffcc) r13 = eventfd2(0x8, 0x80000) r14 = syz_open_dev$loop(&(0x7f00000077c0)='/dev/loop#\x00', 0x101, 0x200) r15 = accept$packet(0xffffffffffffff9c, &(0x7f0000007800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000007840)=0x14) pipe(&(0x7f0000007880)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6(0xa, 0x0, 0x1ff, &(0x7f00000078c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000007900)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007940)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000007a40)=0xe8) getresgid(&(0x7f0000007a80)=0x0, &(0x7f0000007ac0), &(0x7f0000007b00)) r21 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000007b40)='/dev/sequencer2\x00', 0x10000, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000007b80)={0xffffffffffffffff}) r23 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000007bc0)) r24 = syz_open_dev$vcsa(&(0x7f0000007c00)='/dev/vcsa#\x00', 0xcab, 0xc400) r25 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(0xffffffffffffff9c, &(0x7f000000dd40)=[{{&(0x7f0000007c40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000009e00)=[{&(0x7f0000007cc0)=""/245, 0xf5}, {&(0x7f0000007dc0)=""/59, 0x3b}, {&(0x7f0000007e00)=""/4096, 0x1000}, {&(0x7f0000008e00)=""/4096, 0x1000}], 0x4, &(0x7f0000009e40)=""/193, 0xc1, 0x1}, 0x6}, {{&(0x7f0000009f40)=@generic, 0x80, &(0x7f000000a600)=[{&(0x7f0000009fc0)=""/212, 0xd4}, {&(0x7f000000a0c0)=""/95, 0x5f}, {&(0x7f000000a140)=""/31, 0x1f}, {&(0x7f000000a180)=""/231, 0xe7}, {&(0x7f000000a280)=""/44, 0x2c}, {&(0x7f000000a2c0)=""/203, 0xcb}, {&(0x7f000000a3c0)=""/197, 0xc5}, {&(0x7f000000a4c0)=""/87, 0x57}, {&(0x7f000000a540)=""/103, 0x67}, {&(0x7f000000a5c0)=""/30, 0x1e}], 0xa, &(0x7f000000a6c0)=""/124, 0x7c, 0xf1}, 0x2}, {{&(0x7f000000a740)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4}}}, 0x80, &(0x7f000000aa40)=[{&(0x7f000000a7c0)=""/237, 0xed}, {&(0x7f000000a8c0)=""/90, 0x5a}, {&(0x7f000000a940)=""/195, 0xc3}], 0x3, 0x0, 0x0, 0x2}}, {{0x0, 0x0, &(0x7f000000ab40)=[{&(0x7f000000aa80)=""/151, 0x97}], 0x1, &(0x7f000000ab80)=""/176, 0xb0, 0x1f}, 0x1000}, {{&(0x7f000000ac40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000c000)=[{&(0x7f000000acc0)=""/92, 0x5c}, {&(0x7f000000ad40)=""/4096, 0x1000}, {&(0x7f000000bd40)=""/9, 0x9}, {&(0x7f000000bd80)=""/234, 0xea}, {&(0x7f000000be80)=""/226, 0xe2}, {&(0x7f000000bf80)}, {&(0x7f000000bfc0)=""/50, 0x32}], 0x7, &(0x7f000000c080)=""/29, 0x1d, 0x100000001}, 0x2}, {{&(0x7f000000c0c0)=@pptp={0x0, 0x0, {0x0, @dev}}, 0x80, &(0x7f000000c280)=[{&(0x7f000000c140)=""/124, 0x7c}, {&(0x7f000000c1c0)=""/79, 0x4f}, {&(0x7f000000c240)=""/37, 0x25}], 0x3, &(0x7f000000c2c0)=""/98, 0x62, 0x800}, 0xffffffffffffffe0}, {{&(0x7f000000c340)=@ipx, 0x80, &(0x7f000000c500)=[{&(0x7f000000c3c0)=""/70, 0x46}, {&(0x7f000000c440)=""/185, 0xb9}], 0x2}, 0x5145}, {{&(0x7f000000c540)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f000000d880)=[{&(0x7f000000c5c0)=""/89, 0x59}, {&(0x7f000000c640)=""/252, 0xfc}, {&(0x7f000000c740)=""/4096, 0x1000}, {&(0x7f000000d740)=""/174, 0xae}, {&(0x7f000000d800)=""/48, 0x30}, {&(0x7f000000d840)=""/5, 0x5}], 0x6, 0x0, 0x0, 0xf4}, 0x7fffffff}, {{&(0x7f000000d900)=@nfc_llcp, 0x80, &(0x7f000000dcc0)=[{&(0x7f000000d980)=""/37, 0x25}, {&(0x7f000000d9c0)=""/23, 0x17}, {&(0x7f000000da00)=""/89, 0x59}, {&(0x7f000000da80)=""/239, 0xef}, {&(0x7f000000db80)=""/108, 0x6c}, {&(0x7f000000dc00)=""/25, 0x19}, {&(0x7f000000dc40)=""/118, 0x76}], 0x7, 0x0, 0x0, 0x1}, 0x9b}], 0x9, 0x2, &(0x7f000000df80)={0x77359400}) r27 = syz_open_dev$tun(&(0x7f000000dfc0)='/dev/net/tun\x00', 0x0, 0x4000) r28 = syz_open_dev$tun(&(0x7f000000e000)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$netlink(r0, &(0x7f000000e140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)={0x20, 0x16, 0x0, 0x70bd2b, 0x25dfdbfc, "", [@generic="ce2f98d53a3040238fe76b92e09d54"]}, 0x20}, {&(0x7f00000002c0)={0x11ec, 0x2e, 0x100, 0x70bd26, 0x25dfdbff, "", [@generic="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", @typed={0xc, 0x20, @u64=0x8000}, @nested={0x1d0, 0xa, [@typed={0x8, 0x9, @uid=r1}, @generic="52a71dda4e8f7ca8f632d2fe2fa4f05b4cdb219e6cd857026668ad0618af7625cf9fb066e2933aa47f870cdea93c293d6193ad6d5f549f2253b0cee3fea92929645f579e52a033df5a5124ebafba366dd6428e756767e4c027fef4047b1cc1d8f33514c699f4427ba6594fa7451dc8587d41e3cc3a55518633b4ee22f1ae997989844bed28d6594931511722ec5fea10786278dd317a564a25602f5507f523599706111786b481439bbe616cf263faac3f1ad8c00792b6986b28d0f72aea262bc81ea902ba39db2fd8a1bda721", @typed={0x8, 0x90, @uid=r2}, @generic="15369cdaa8a416a8bd4fceb9cff0e9cb32df23821a1d57e91847bbe904cabf496ace074c7bc9cf9a9c1e9288b53345a087cde475622c9b8ec0c427e202e91bd3bdf75993085ae2e9ac46c1069b2ae2bb8601baaa6059a4ab2ec99c86d610a8ab358a417bad3d7ee7aab0a8de6e8a1d3e4e7c6fbb", @typed={0x8, 0x1, @u32=0x2}, @typed={0x8, 0x24, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}, @generic="f8fee59858b9bd32ecb49cdd41372e6eca5fe494b7c117ee7b4b675ed4a1e36b4d11b420b8b9548940f184b7ecb0b590e27fe8892e810c8ab0da28dd2367ad5a5cc955ac7541373ca8430fda", @generic="74922817e27b32de3ed25a0eff34eeae7d08d6a1ae200f050f99eb5cc18d"]}]}, 0x11ec}], 0x2, &(0x7f000000e040)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r6, r7, r8]}, @rights={0x28, 0x1, 0x1, [r9, r10, r11, r12, r13]}, @rights={0x20, 0x1, 0x1, [r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x30, 0x1, 0x1, [r21, r22, r23, r24, r25, r26, r27, r28]}], 0xd8, 0x4}, 0x8004) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 2018/04/13 10:18:53 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) 2018/04/13 10:18:53 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) socket(0x10, 0x80400000802, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10000, 0x240) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) r1 = geteuid() ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0], 0x1}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1}, 0xfffffffffffffffe}) 2018/04/13 10:18:53 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r0 = syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x200000) pwrite64(r0, &(0x7f0000000040)="28e7e472fb4d844abfb6633da9229d66c8e0a9c15543279bc65cef9271053c117aae8c3ebc8644d7c2af7b83071ea6b0ba42de17d7aa871a34fe36642d8d51d5db7a5b547174eafecc84f9c005cf756160f2b97e4cb46101a319e4c38f79cbeee228210a1adaec8127022aca1ca95ebaa79a432f4517240004973d3d91ac6b78554ab53a21e231962cf4904aa74c98bdb9a4fc9aff", 0x95, 0x0) 2018/04/13 10:18:53 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r2 = shmget(0x0, 0x1000, 0x218, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000000)={{0x0, 0x0, r1, 0x0, r0, 0x800000}}) 2018/04/13 10:18:53 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:53 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 2018/04/13 10:18:54 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)=0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3ec, r4, &(0x7f0000000040)="11850c9805c895cee376374d06987e752ffe30f2a18594fc2406380b7766fb5fc71ac76506d99769679d9e47230b288829b72f56e8f57569b6fb06a2b709f9bb593dd933e8e1ae9541361c364054a9", 0x4f, 0x4, 0x0, 0x0, r5}, &(0x7f0000000140)) 2018/04/13 10:18:54 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffc000/0x3000)=nil) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000fc0)=0x0) write$binfmt_aout(r1, &(0x7f00000002c0)={{0xcc, 0x2, 0xffffffffffffffff, 0x3b6, 0x2b1, 0x0, 0x38c, 0x10000}, "e5c4c852eb777aa863a409ea6c7c3baf0384e3d071e028ee5b98948e1463df7c36f7550a5495809167ad895595efb2423890742adc89170e464b321b304fe209c1dd20565641f7bea348eb22f001fd90138e2f2a2b58c64fdd56fa3ad27a2bba4839dba0fd93cb304d5780fc4cd83bf86603a94fe3d10301c0ae25546ea481a6ed8923d25a1dfe9c2dbf3e74ee85", [[], [], [], [], [], [], [], []]}, 0x8ae) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x8, &(0x7f0000000e80)=[{&(0x7f0000000140)="6f4df6b0cc5f5cded88a4f04752f9bc6fc99a1245120a113f325fb52257a0afa5ebdadd7316be677b5b0073d09bd5c67a50037db651b54fe2297366adf57f6c7be15de59218266", 0x47, 0x4}, {&(0x7f00000001c0)="5b9060365537e69abb5189318601c40fe9c614ab43046542c2cea676e82dae97dfa4f9b34369af87b2086e5f934a643c2cc6ef1d85f41ade3859ac210ca6ac927899f55bd067e740c244", 0x4a, 0x1db}, {&(0x7f0000000b80)="ab073b2d882b620e56f2e7cef240748169273bd7f5220e2496f7c542eafa6d9ed9208eac5299f12c7d6810aec458a14957cacb82", 0x34, 0x7f}, {&(0x7f0000000bc0), 0x0, 0x2}, {&(0x7f0000000c00)="ad49b5688a38ca87ea7c2f", 0xb, 0x7}, {&(0x7f0000000c40)="0715b3490696ef393c2f9e9b39d3b449fa1d0ec9b3bfda74d5b2dcda9da19994b356524b3e1935da7a9cf08114fe1924dcc1856233ea78541214e39b7a17015ee0", 0x41, 0x8}, {&(0x7f0000000cc0)="eaf7f25a4c008c41ed8704959039f3fd42f4c92120dd32ba55f1d4bc327fc28e7f8b6c04829d99aee29aa2fc71f79744776b51aa5e34b0fd68d646f0e1b0ca3dba9d0366072e01907892630040a37fc33997e29def7d055cdf127a0092e32acdb8b919e68666038a3ccd51d37e61ac57b02beaa52e7eded46fca134df3b5f9cd6d", 0x81, 0x597d}, {&(0x7f0000000d80)="7a06df967720b49e838ffcb33c000ae349effb8112e9a11672e1f6de467d0dbbe216cbd8945bf543c07a76e6c2eeb70a9289e08e0c7fa920784e729ca931d11ba4e27431efb688198598d50b4ddf034256ea6ab153a6a4230a5dd7e97ad48d1a59fc9a21ea38db3b4a16d582a39acaca4ba8358e0777f03fd4210f689d354d7754360e13d83ebfef85a765dae572b96e74669c177bb6c5d268698f2a286b2151309a0b091292f5bb07ca7e363ad233ba4310651d92969de55ba5bdf25ed59a412c689761d27ac45a5fcdad2f396bdeaeb8fe623ab52d19eed965", 0xda, 0x1}], 0x481, &(0x7f0000000f40)={[{@nodatacow='nodatacow', 0x2c}, {@autodefrag='autodefrag', 0x2c}]}) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x70}, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0xffffffffffffffff}) 2018/04/13 10:18:54 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) 2018/04/13 10:18:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 1: r0 = socket(0x13, 0x20000000000003, 0x0) write(r0, &(0x7f00008c6fdd)="220000005e000721004f10f7e2ff0500020003000100000500000000e700ff02f155", 0x22) get_thread_area(&(0x7f0000000000)={0x8, 0x20001000, 0x400, 0x4, 0x66, 0x1, 0x9, 0x800, 0x2}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000080)=0xfffffffffffffffc, 0x4) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x9, 0x10}, 0x2) 2018/04/13 10:18:54 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:54 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0xe010, 0x8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x4, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e24, @multicast1=0xe0000001}, {0x2, 0x4e20, @rand_addr=0x2}, 0x80, 0xfd, 0xea, 0x100000001, 0xffff, &(0x7f0000000040)='irlan0\x00', 0x1, 0xffffffffffffffe0, 0x8}) 2018/04/13 10:18:55 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000240)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) 2018/04/13 10:18:55 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:55 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x1000, 0x4) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 2018/04/13 10:18:55 executing program 1: shmget(0x0, 0x4000, 0x78000040, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 2018/04/13 10:18:55 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:55 executing program 1: r0 = semget(0x1, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getresgid(&(0x7f0000000200)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000340)={{0x7f, r1, r2, r3, r4, 0x28, 0x6}, 0x8, 0x6, 0x1}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='./file0\x00') 2018/04/13 10:18:55 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:55 executing program 2: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:55 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:55 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) 2018/04/13 10:18:55 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:55 executing program 1: r0 = getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) fstat(0xffffffffffffffff, &(0x7f0000000040)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r2, 0x0, 0x2}, 0x4, 0x0, 0x0, 0x0, r0, r1}) creat(&(0x7f0000000180)='./file1\x00', 0x0) 2018/04/13 10:18:56 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket$nl_route(0x10, 0x3, 0x0) tee(r0, r1, 0x6, 0x4) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 2018/04/13 10:18:56 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000340)=""/204, 0xcc}, &(0x7f00000002c0), 0x9}, 0xb) r1 = getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r2, r1, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4}) 2018/04/13 10:18:56 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:56 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:56 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="b4506dba3e8a617b40cce98c3580bf057f05d7dc92b74debf9eb0a316f6662c38a0a3a46c965829c098859ac0b395404df51f29c6feab85ca283ee5959b418685864c12bc5566a1a739a7c882c39c7b327a481243f9e77a84c7e7cadc46845b140275f1df0a0660c0051"], 0x2) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x1, &(0x7f0000ffe000/0x1000)=nil, 0x2) 2018/04/13 10:18:56 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r2 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3, 0x0, 0x0, 0x0, r1, 0x0, 0x800}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000040)={0x1}) ioctl$sock_netrom_SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000080)) shmget(0x3, 0x2000, 0x108, &(0x7f0000ffc000/0x2000)=nil) 2018/04/13 10:18:56 executing program 2: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:56 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:56 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) r2 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3, 0x0, 0x0, 0x0, r1, 0x0, 0x800}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000040)={0x1}) ioctl$sock_netrom_SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000080)) shmget(0x3, 0x2000, 0x108, &(0x7f0000ffc000/0x2000)=nil) 2018/04/13 10:18:57 executing program 2: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:18:57 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:57 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:57 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 0: socket(0x11, 0x100000802, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) 2018/04/13 10:18:57 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 0: socket(0x11, 0x100000802, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:18:57 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:57 executing program 0: socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:18:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:18:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) 2018/04/13 10:18:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:18:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) 2018/04/13 10:18:58 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:58 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:18:59 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:18:59 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:00 executing program 3: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) 2018/04/13 10:19:00 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:00 executing program 3: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 3: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 2: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:01 executing program 5: socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:02 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:02 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:02 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:02 executing program 5: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:02 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:03 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:03 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:03 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:05 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:05 executing program 1: socket(0x10, 0x3, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) 2018/04/13 10:19:05 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) 2018/04/13 10:19:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) 2018/04/13 10:19:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:05 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:05 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:05 executing program 1: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) 2018/04/13 10:19:06 executing program 1: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) socket(0x10, 0x80400000802, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:06 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) 2018/04/13 10:19:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:07 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:07 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) 2018/04/13 10:19:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) 2018/04/13 10:19:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) 2018/04/13 10:19:07 executing program 6: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:07 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 4: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 2: socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) 2018/04/13 10:19:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:08 executing program 7: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:09 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:09 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:09 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:09 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) 2018/04/13 10:19:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) 2018/04/13 10:19:09 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) 2018/04/13 10:19:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) 2018/04/13 10:19:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:10 executing program 4: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 7: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:10 executing program 4: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 2: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 7: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:10 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) 2018/04/13 10:19:11 executing program 2: r0 = socket(0x0, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:11 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:11 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:11 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:12 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:12 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x11, 0x100000802, 0x0) 2018/04/13 10:19:12 executing program 0: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x100000802, 0x0) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/13 10:19:13 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 2018/04/13 10:19:13 executing program 2: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:13 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:13 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:13 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:14 executing program 0: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:14 executing program 2: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:14 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:14 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:14 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:14 executing program 0: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:14 executing program 2: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:14 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x100000802, 0x0) 2018/04/13 10:19:15 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) 2018/04/13 10:19:15 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 2: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 3: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 3: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 2: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 3: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:15 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:15 executing program 3: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:16 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)=0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3ec, r4, &(0x7f0000000040)="11850c9805c895cee376374d06987e752ffe30f2a18594fc2406380b7766fb5fc71ac76506d99769679d9e47230b288829b72f56e8f57569b6fb06a2b709f9bb593dd933e8e1ae9541361c364054a9", 0x4f, 0x4, 0x0, 0x0, r5}, &(0x7f0000000140)) 2018/04/13 10:19:16 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/13 10:19:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:16 executing program 6: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:16 executing program 2: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:16 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)=0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3ec, r4, &(0x7f0000000040)="11850c9805c895cee376374d06987e752ffe30f2a18594fc2406380b7766fb5fc71ac76506d99769679d9e47230b288829b72f56e8f57569b6fb06a2b709f9bb593dd933e8e1ae9541361c364054a9", 0x4f, 0x4, 0x0, 0x0, r5}, &(0x7f0000000140)) 2018/04/13 10:19:16 executing program 2: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:16 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)=0x0) r4 = socket$nl_crypto(0x10, 0x3, 0x15) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3ec, r4, &(0x7f0000000040)="11850c9805c895cee376374d06987e752ffe30f2a18594fc2406380b7766fb5fc71ac76506d99769679d9e47230b288829b72f56e8f57569b6fb06a2b709f9bb593dd933e8e1ae9541361c364054a9", 0x4f, 0x4, 0x0, 0x0, r5}, &(0x7f0000000140)) 2018/04/13 10:19:16 executing program 4: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 7: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00'}) 2018/04/13 10:19:16 executing program 2: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 2018/04/13 10:19:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:17 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)) socket$nl_crypto(0x10, 0x3, 0x15) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) 2018/04/13 10:19:17 executing program 7: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x10, 0x80400000802, 0x0) write(r2, &(0x7f0000af7000)="240000001a0025f00000000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:17 executing program 2: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 2018/04/13 10:19:17 executing program 4: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:17 executing program 6: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:17 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:17 executing program 6: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:17 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)) socket$nl_crypto(0x10, 0x3, 0x15) 2018/04/13 10:19:17 executing program 2: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 2018/04/13 10:19:17 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:17 executing program 6: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:17 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r2 = getpgid(0x0) ptrace(0x420f, r2) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:17 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:17 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20040, 0x0) 2018/04/13 10:19:18 executing program 5: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) getpgid(0x0) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:18 executing program 1: socket(0x10, 0x3, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/04/13 10:19:18 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:18 executing program 2: r0 = msgget$private(0x0, 0x1c) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000002c0)=""/145) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x3d98bfd9ea448732) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000200)=0x54) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xc8, r2, 0x500, 0x70bd29, 0x25dfdbfd, {0xf}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x29}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3cbe}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1b, 0x2}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8001}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x10}}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4008080}, 0x4000084) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) r3 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r3, 0x0) 2018/04/13 10:19:18 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:18 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) 2018/04/13 10:19:18 executing program 5: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100), 0x0, 0xfffffffffffffffb) 2018/04/13 10:19:18 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x5, 0x3f, 0x1, 0x8, 0x40, 0x1, 0x6, 0xfffffffffffffffb, r1}, 0x20) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x100000802, 0x0) r2 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:19 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:19 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:19 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, r1, 0x0, 0xfffffffffffffffd}}) 2018/04/13 10:19:19 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e24, 0x200040, @empty, 0x47}}, [0x9, 0xffff, 0x10001, 0x558, 0x0, 0x401, 0x3f, 0x58, 0x89c4, 0x5, 0x100, 0xec, 0xce, 0x10000, 0x2]}, &(0x7f00000001c0)=0x100) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:19 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) 2018/04/13 10:19:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x10, 0x80400000802, 0x0) write(r2, &(0x7f0000af7000)="240000001a0025f00000000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:19 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)) io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:20 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:20 executing program 0: io_setup(0x3ff, &(0x7f0000000000)) 2018/04/13 10:19:20 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) 2018/04/13 10:19:20 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) r4 = accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) r7 = getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) r10 = eventfd2(0x8, 0x801) r11 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)={0xffffffffffffffff}) r13 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000, 0xffffffffffffffff}) r22 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) r23 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) r24 = syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)={0xffffffffffffffff}) r26 = signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) r28 = syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) r29 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) r30 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) r31 = signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) r32 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r33 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00)={0x0, 0x0, 0x0}, &(0x7f0000000f40)=0xc) r35 = syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff}) r41 = epoll_create(0x1) r42 = syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) r43 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) r44 = socket$nl_xfrm(0x10, 0x3, 0x6) r45 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) r46 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) r47 = socket$inet_icmp(0x2, 0x2, 0x1) r48 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r51 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000340)="1116dd860fccb8709ce036f0f0be31da51350f31f50b3a4e37b045a0051cc96d2840fb344ce06071e6fc61788dd8f3dff609242a1306748ed502255d0b8050c8eaf340ed958751c645b6f99bc7b14d98ed09b8528dcd622be40e4b6e1103a6e3d50f9d7cab94778f55f77c4848bd12dab179d0279e5cd669cb536b55b34a17c97aac26eabb2eade0251b", 0x8a}], 0x1, &(0x7f0000001c00)=[@rights={0x18, 0x1, 0x1, [r3, r4]}, @cred={0x20, 0x1, 0x2, r5, r1, r6}, @cred={0x20, 0x1, 0x2, r7, r1, r8}, @rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r1, r19}, @rights={0x38, 0x1, 0x1, [r20, r21, r22, r23, r24, r25, r26, r27, r28]}, @rights={0x20, 0x1, 0x1, [r29, r30, r31, r32]}, @cred={0x20, 0x1, 0x2, r33, r1, r34}, @rights={0x30, 0x1, 0x1, [r35, r36, r37, r38, r39, r40, r41]}, @rights={0x38, 0x1, 0x1, [r42, r43, r44, r45, r46, r47, r48, r49, r50, r51]}], 0x190, 0x44000}, 0x10) 2018/04/13 10:19:20 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:20 executing program 0: io_setup(0x0, &(0x7f0000000000)) 2018/04/13 10:19:20 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) 2018/04/13 10:19:20 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:20 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:20 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:20 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:20 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:20 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:20 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:20 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:21 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:21 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:21 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000012000), 0x4) r1 = eventfd2(0x0, 0x0) dup3(r1, r0, 0x0) 2018/04/13 10:19:21 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:21 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) 2018/04/13 10:19:21 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) write(r1, &(0x7f0000f8aff1), 0xff8f) ioperm(0x6, 0xff, 0x1ff) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)) 2018/04/13 10:19:21 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) [ 131.474749] dccp_xmit_packet: Payload too large (65423) for featneg. 2018/04/13 10:19:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x10, 0x80400000802, 0x0) write(r2, &(0x7f0000af7000)="240000001a0025f00000000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:21 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:21 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) 2018/04/13 10:19:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) r2 = socket(0x10, 0x80400000802, 0x0) write(r2, &(0x7f0000af7000)="240000001a0025f00000000418edfc0e0a0b00000004dc0202ffff0e0800100048186be0", 0x24) r3 = socket(0x11, 0x100000802, 0x0) r4 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:21 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001b40)) accept4$packet(0xffffffffffffff9c, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001bc0)=0x14, 0x80000) 2018/04/13 10:19:21 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) 2018/04/13 10:19:21 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:21 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) 2018/04/13 10:19:22 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001b00)) 2018/04/13 10:19:22 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) 2018/04/13 10:19:22 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:22 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:22 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:22 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:22 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:22 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:22 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:22 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:22 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:22 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:22 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:22 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) 2018/04/13 10:19:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x400200) socket(0x10, 0x80400000802, 0x0) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:22 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 2018/04/13 10:19:23 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:23 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:23 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:23 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:23 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) 2018/04/13 10:19:23 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) socket$inet_icmp(0x2, 0x2, 0x1) 2018/04/13 10:19:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:24 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) 2018/04/13 10:19:24 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:24 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:24 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) 2018/04/13 10:19:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:24 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) 2018/04/13 10:19:24 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, r0}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={r3, 0x1000, "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"}, &(0x7f0000001480)=0x1008) 2018/04/13 10:19:24 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x0, 0x2f815da2a89fe15c) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001a80)={0x0, 0x0, 0x0, @local}, &(0x7f0000001ac0)=0x1c, 0x80000) 2018/04/13 10:19:24 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, r0}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={r3, 0x1000, "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"}, &(0x7f0000001480)=0x1008) 2018/04/13 10:19:24 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000000)=@ax25={0x3, {"8aafabddcfcc23"}}, 0x10, &(0x7f00000004c0)}, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000001100)="a1", 0x1, 0xfffffffffffffffb) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180), 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) socket(0x18, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000003000)=@rc={0x1f}, 0x80, &(0x7f0000004fa0), 0x0, &(0x7f0000002d30)}}], 0x1, 0x0) write(r0, &(0x7f0000000180)="240000005a005f191415f507125a000009037b1595a7f1d6d8210308001000fff708ff", 0x23) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x1001}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xa201}) 2018/04/13 10:19:24 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:24 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) epoll_create(0x1) 2018/04/13 10:19:24 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, r0}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000440)={r3, 0x1000, "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"}, &(0x7f0000001480)=0x1008) 2018/04/13 10:19:24 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) 2018/04/13 10:19:24 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:24 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, r0}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000003c0)={0x0, 0x6}, &(0x7f0000000400)=0x8) 2018/04/13 10:19:24 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) 2018/04/13 10:19:25 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:25 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) epoll_create(0x1) 2018/04/13 10:19:25 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:25 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, r1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, r0}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/13 10:19:25 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) 2018/04/13 10:19:25 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:25 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:25 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) 2018/04/13 10:19:25 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/13 10:19:26 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:26 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001600)={0x28, 0x0, 0x2710, @host=0x2}, 0x10, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) 2018/04/13 10:19:26 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:26 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/13 10:19:26 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:26 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/13 10:19:26 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) epoll_create(0x1) 2018/04/13 10:19:26 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:26 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) 2018/04/13 10:19:26 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:26 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:26 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:26 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:26 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:26 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') epoll_create(0x1) 2018/04/13 10:19:27 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:27 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) epoll_create(0x1) 2018/04/13 10:19:27 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:27 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:27 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:27 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:27 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:27 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:27 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:27 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) epoll_create(0x1) 2018/04/13 10:19:27 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:27 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) epoll_create(0x1) 2018/04/13 10:19:27 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:27 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:27 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:27 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:27 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:27 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) syz_open_dev$evdev(&(0x7f00000015c0)='/dev/input/event#\x00', 0x9, 0x20000) 2018/04/13 10:19:27 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:27 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) epoll_create(0x1) 2018/04/13 10:19:28 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:28 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:28 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) epoll_create(0x1) 2018/04/13 10:19:28 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:28 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:28 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) epoll_create(0x1) 2018/04/13 10:19:28 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:28 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:28 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) socketpair(0x5, 0x80f, 0x100, &(0x7f0000001580)) 2018/04/13 10:19:28 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:28 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) epoll_create(0x1) 2018/04/13 10:19:28 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) 2018/04/13 10:19:28 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:28 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:28 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:28 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:28 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:29 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000001540)) 2018/04/13 10:19:29 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) 2018/04/13 10:19:29 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:29 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) epoll_create(0x1) 2018/04/13 10:19:29 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:29 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:29 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) 2018/04/13 10:19:29 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) 2018/04/13 10:19:29 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) epoll_create(0x1) 2018/04/13 10:19:29 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) 2018/04/13 10:19:29 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) syz_open_dev$random(&(0x7f0000001500)='/dev/random\x00', 0x0, 0x40000) 2018/04/13 10:19:29 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:29 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) 2018/04/13 10:19:29 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) 2018/04/13 10:19:29 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) epoll_create(0x1) 2018/04/13 10:19:29 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:29 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) 2018/04/13 10:19:29 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001000)) 2018/04/13 10:19:30 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) 2018/04/13 10:19:30 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) 2018/04/13 10:19:30 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) epoll_create(0x1) 2018/04/13 10:19:30 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) 2018/04/13 10:19:30 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) 2018/04/13 10:19:30 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000fc0)='rdma.current\x00', 0x0, 0x0) 2018/04/13 10:19:30 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) 2018/04/13 10:19:30 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) 2018/04/13 10:19:30 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) epoll_create(0x1) 2018/04/13 10:19:30 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) epoll_create(0x1) 2018/04/13 10:19:30 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) 2018/04/13 10:19:30 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:30 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) 2018/04/13 10:19:30 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) 2018/04/13 10:19:31 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) 2018/04/13 10:19:31 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) epoll_create(0x1) 2018/04/13 10:19:31 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) 2018/04/13 10:19:31 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:31 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) epoll_create(0x1) 2018/04/13 10:19:31 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) socket$bt_rfcomm(0x1f, 0x3, 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) epoll_create(0x1) 2018/04/13 10:19:31 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000ec0), 0x8, 0x80000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:31 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) 2018/04/13 10:19:31 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:31 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:31 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) 2018/04/13 10:19:32 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:32 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) 2018/04/13 10:19:32 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) epoll_create(0x1) 2018/04/13 10:19:32 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file0\x00', 0x0, 0x10}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) 2018/04/13 10:19:32 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:32 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:32 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/vga_arbiter\x00', 0x800, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) epoll_create(0x1) 2018/04/13 10:19:32 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_dev$usbmon(&(0x7f0000000dc0)='/dev/usbmon#\x00', 0x101, 0x480000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:32 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) epoll_create(0x1) 2018/04/13 10:19:32 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) 2018/04/13 10:19:32 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:32 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:32 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:33 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) epoll_create(0x1) 2018/04/13 10:19:33 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:33 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) 2018/04/13 10:19:33 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) signalfd(0xffffffffffffff9c, &(0x7f0000000b80)={0xdc9}, 0x8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:33 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:33 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:33 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) epoll_create(0x1) 2018/04/13 10:19:33 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:33 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:33 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b40)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) epoll_create(0x1) 2018/04/13 10:19:34 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:34 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) epoll_create(0x1) 2018/04/13 10:19:34 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:34 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) accept4$netrom(0xffffffffffffffff, &(0x7f0000000a40)=@full, &(0x7f0000000ac0)=0x48, 0x800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) epoll_create(0x1) 2018/04/13 10:19:34 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:34 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20000, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) epoll_create(0x1) 2018/04/13 10:19:34 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:34 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:34 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:34 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000009c0)={0x0, 0x80000}) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) epoll_create(0x1) 2018/04/13 10:19:35 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:35 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) socket$inet6_dccp(0xa, 0x6, 0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) epoll_create(0x1) 2018/04/13 10:19:35 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:35 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) epoll_create(0x1) 2018/04/13 10:19:35 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:35 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:35 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:35 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) epoll_create(0x1) 2018/04/13 10:19:36 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:36 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_dev$urandom(&(0x7f0000000840)='/dev/urandom\x00', 0x0, 0x400000) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) epoll_create(0x1) 2018/04/13 10:19:36 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:36 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000800)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:36 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) epoll_create(0x1) 2018/04/13 10:19:36 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:36 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:36 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) epoll_create(0x1) 2018/04/13 10:19:37 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:37 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) epoll_create(0x1) 2018/04/13 10:19:37 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:37 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) epoll_create(0x1) 2018/04/13 10:19:37 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:37 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) epoll_create(0x1) 2018/04/13 10:19:37 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:37 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:37 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:37 executing program 3: epoll_create(0x1) 2018/04/13 10:19:37 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:38 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 3: epoll_create(0x0) 2018/04/13 10:19:38 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:38 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:38 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1, [], r0}, 0x48) 2018/04/13 10:19:38 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:38 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:39 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 7: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 7: syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 7: syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x0) 2018/04/13 10:19:39 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:39 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:39 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85, 0x0, 0x0, 0x3e}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:39 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:39 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:40 executing program 0: syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x0, &(0x7f0000000bc0)=@raw, &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:40 executing program 5: syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x200) 2018/04/13 10:19:40 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x0, &(0x7f0000000bc0)=@raw, &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:40 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 5: syz_open_dev$sndseq(&(0x7f0000000b00)='/dev/snd/seq\x00', 0x0, 0x0) 2018/04/13 10:19:40 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) accept$ipx(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) memfd_create(&(0x7f00000006c0)='mime_type\x00', 0x3) eventfd2(0x8, 0x801) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000700)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) pipe(&(0x7f0000000740)) accept4$ax25(0xffffffffffffff9c, &(0x7f0000000780), &(0x7f00000007c0)=0x10, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) fallocate(r0, 0x0, 0x0, 0x5) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) 2018/04/13 10:19:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/13 10:19:40 executing program 0: perf_event_open(&(0x7f0000b7a000)={0x2, 0x78, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000000780), 0x0, &(0x7f0000000b40), 0x0, 0x0) 2018/04/13 10:19:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x0, &(0x7f0000000bc0)=@raw, &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) [ 150.418368] netlink: 28 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 10:19:40 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) 2018/04/13 10:19:40 executing program 2: syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:40 executing program 0: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x5) r1 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000fb6000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x20000010800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f000019ffe9)={0xc1}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0x80045300, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 150.535204] netlink: 28 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 10:19:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000841000)=0x177, 0x1d0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000204ffc)=0x4000000009, 0xfffffffffffffdf0) sendto$inet6(r0, &(0x7f00009f0fc3), 0x0, 0x0, &(0x7f0000f5afe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000f61000)=[{{&(0x7f0000f62ff0)=@ipx, 0x10, &(0x7f0000f5d000), 0x0, &(0x7f0000f62000)}}], 0x1, 0x2041, 0x0) 2018/04/13 10:19:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/13 10:19:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f00008c0f4c), 0x0, 0x800000120000001, &(0x7f0000e45ff0)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 2018/04/13 10:19:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='dctcp\x00', 0x6) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000003e00)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00000000c0)="b3", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/13 10:19:41 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85}], &(0x7f0000000c00)='syzkaller\x00', 0xfff, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:41 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') sendfile(r0, r1, &(0x7f000097d000)=0x4c02, 0x100) 2018/04/13 10:19:41 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@mcast1}}}, &(0x7f0000000100)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000140)=@nl=@unspec, &(0x7f00000001c0)=0x80, 0x80800) syz_open_procfs(0x0, &(0x7f0000000f80)='io\x00') 2018/04/13 10:19:41 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) read(r0, &(0x7f0000000000)=""/188, 0xbc) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000e78a42), 0xd, 0x8084, &(0x7f00004d4000)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f00000001c0)="fbf327899de7fe7e0c02fe5cbb35491715b7af5588d711d931dc02ad3afd3749bb6ac7383d2bfac27aa9c48c5d847fdc41ddc4b7c3add170", 0x38, 0x0, &(0x7f0000000200)={0x2, 0x0, @rand_addr}, 0x10) [ 151.682497] netlink: 28 bytes leftover after parsing attributes in process `syz-executor7'. 2018/04/13 10:19:41 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x8, 0x2, &(0x7f0000000bc0)=@raw=[@call={0x85}], &(0x7f0000000c00)='syzkaller\x00', 0x0, 0xe3, &(0x7f0000000c40)=""/227, 0x41f00, 0x1}, 0x48) 2018/04/13 10:19:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000007fc8)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001000ff20fffefd956fc283b724a600000d00000000060000000000001000010006c41180b598bc593a02001148a730df33a49868c62b2ca654a6613b6aab02000000bc832b0790ed", 0x4c}], 0x1}, 0x0) 2018/04/13 10:19:41 executing program 2: 2018/04/13 10:19:41 executing program 4: [ 151.926562] netlink: 28 bytes leftover after parsing attributes in process `syz-executor7'. [ 152.530765] ================================================================== [ 152.538170] BUG: KMSAN: uninit-value in csum_partial_copy_to_user+0x450/0x500 [ 152.545431] CPU: 0 PID: 10549 Comm: syz-executor0 Not tainted 4.16.0+ #83 [ 152.552331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.561659] Call Trace: [ 152.564227] dump_stack+0x185/0x1d0 [ 152.567847] ? csum_partial_copy_to_user+0x450/0x500 [ 152.572932] kmsan_report+0x142/0x240 [ 152.576724] __msan_warning_32+0x6c/0xb0 [ 152.580768] csum_partial_copy_to_user+0x450/0x500 [ 152.585681] csum_and_copy_to_iter+0x3dc/0x2140 [ 152.590334] ? kmsan_set_origin_inline+0x6b/0x120 [ 152.595161] ? __msan_poison_alloca+0x15c/0x1d0 [ 152.599817] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 152.604905] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 152.610254] udp_recvmsg+0x99c/0x1d90 [ 152.614064] ? udp_skb_dtor_locked+0x770/0x770 [ 152.618720] inet_recvmsg+0x4c2/0x5f0 [ 152.622503] ? inet_sendpage+0x8c0/0x8c0 [ 152.626544] sock_read_iter+0x405/0x480 [ 152.630500] ? kernel_sock_ip_overhead+0x350/0x350 [ 152.635411] __vfs_read+0x6fb/0x8e0 [ 152.639052] vfs_read+0x36c/0x6c0 [ 152.642515] SYSC_read+0x172/0x360 [ 152.646063] SyS_read+0x55/0x80 [ 152.649336] do_syscall_64+0x309/0x430 [ 152.653217] ? vfs_write+0x8d0/0x8d0 [ 152.656925] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 152.662092] RIP: 0033:0x455319 [ 152.665259] RSP: 002b:00007f9153b21c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 152.672950] RAX: ffffffffffffffda RBX: 00007f9153b226d4 RCX: 0000000000455319 [ 152.680208] RDX: 00000000000000bc RSI: 0000000020000000 RDI: 0000000000000013 [ 152.687459] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 152.694708] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 152.701954] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000000 [ 152.709205] [ 152.710807] Uninit was created at: [ 152.714329] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 152.719328] kmsan_alloc_page+0x82/0xe0 [ 152.723300] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 152.728066] alloc_pages_current+0x6b5/0x970 [ 152.732473] skb_page_frag_refill+0x3ba/0x5e0 [ 152.736961] sk_page_frag_refill+0xa4/0x340 [ 152.741274] __ip_append_data+0x107e/0x3d10 [ 152.745578] ip_append_data+0x2fb/0x440 [ 152.749530] udp_sendmsg+0x746/0x3180 [ 152.753307] inet_sendmsg+0x48d/0x740 [ 152.757088] SYSC_sendto+0x6c3/0x7e0 [ 152.760779] SyS_sendto+0x8a/0xb0 [ 152.764212] do_syscall_64+0x309/0x430 [ 152.768080] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 152.773242] ================================================================== [ 152.780574] Disabling lock debugging due to kernel taint [ 152.786005] Kernel panic - not syncing: panic_on_warn set ... [ 152.786005] [ 152.793362] CPU: 0 PID: 10549 Comm: syz-executor0 Tainted: G B 4.16.0+ #83 [ 152.801564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.810897] Call Trace: [ 152.813468] dump_stack+0x185/0x1d0 [ 152.817079] panic+0x39d/0x940 [ 152.820265] ? csum_partial_copy_to_user+0x450/0x500 [ 152.825347] kmsan_report+0x238/0x240 [ 152.829129] __msan_warning_32+0x6c/0xb0 [ 152.833181] csum_partial_copy_to_user+0x450/0x500 [ 152.838093] csum_and_copy_to_iter+0x3dc/0x2140 [ 152.842756] ? kmsan_set_origin_inline+0x6b/0x120 [ 152.847585] ? __msan_poison_alloca+0x15c/0x1d0 [ 152.852239] skb_copy_and_csum_datagram+0x6d2/0x1080 [ 152.857328] skb_copy_and_csum_datagram_msg+0x557/0x960 [ 152.862674] udp_recvmsg+0x99c/0x1d90 [ 152.866462] ? udp_skb_dtor_locked+0x770/0x770 [ 152.871036] inet_recvmsg+0x4c2/0x5f0 [ 152.874831] ? inet_sendpage+0x8c0/0x8c0 [ 152.878870] sock_read_iter+0x405/0x480 [ 152.882827] ? kernel_sock_ip_overhead+0x350/0x350 [ 152.887739] __vfs_read+0x6fb/0x8e0 [ 152.891349] vfs_read+0x36c/0x6c0 [ 152.894785] SYSC_read+0x172/0x360 [ 152.898316] SyS_read+0x55/0x80 [ 152.901581] do_syscall_64+0x309/0x430 [ 152.905456] ? vfs_write+0x8d0/0x8d0 [ 152.909154] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 152.914319] RIP: 0033:0x455319 [ 152.917487] RSP: 002b:00007f9153b21c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 152.925172] RAX: ffffffffffffffda RBX: 00007f9153b226d4 RCX: 0000000000455319 [ 152.932419] RDX: 00000000000000bc RSI: 0000000020000000 RDI: 0000000000000013 [ 152.939755] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 152.947006] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 152.954262] R13: 0000000000000487 R14: 00000000006f9d48 R15: 0000000000000000 [ 152.961961] Dumping ftrace buffer: [ 152.965480] (ftrace buffer empty) [ 152.969163] Kernel Offset: disabled [ 152.972764] Rebooting in 86400 seconds..