INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.37' (ECDSA) to the list of known hosts. 2018/04/27 15:25:31 fuzzer started 2018/04/27 15:25:32 dialing manager at 10.128.0.26:34871 syzkaller login: [ 47.967903] can: request_module (can-proto-0) failed. [ 47.979193] can: request_module (can-proto-0) failed. 2018/04/27 15:25:39 kcov=true, comps=false 2018/04/27 15:25:43 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001500)}, 0x0) close(r0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/27 15:25:43 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x12, 0x0, 0x0, &(0x7f0000000000)) 2018/04/27 15:25:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000180), 0x455) close(r1) 2018/04/27 15:25:43 executing program 7: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) writev(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)="bc5094d859b3cb03", 0x8}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0xfffffffeffffffff, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/27 15:25:43 executing program 5: clone(0x0, &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000180), &(0x7f0000000100)) semop(0x0, &(0x7f0000020fe8)=[{0x0, 0x4000000000081}], 0x1) 2018/04/27 15:25:43 executing program 2: r0 = memfd_create(&(0x7f0000000140)="736563757269747d917617cb0e3dbe4574656f00", 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000000000), 0xb516) lseek(r0, 0xf747000000000000, 0x3) fchmod(r0, 0x0) 2018/04/27 15:25:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe000001000000000800010000000000b1d065aaadf20c0f0800ef4c4fb4db8c9ab1e0a1c68e39855b15bd9213ca7b34afda56fd0e8e21693b2e2caec125e1b49a3f7fc558e660ef5a4a73a38f5d349b5b9771de"], 0x1}, 0x1}, 0x0) 2018/04/27 15:25:43 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xffffffdffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff}}, 0xe8) [ 52.911527] IPVS: ftp: loaded support on port[0] = 21 [ 53.077836] IPVS: ftp: loaded support on port[0] = 21 [ 53.140638] IPVS: ftp: loaded support on port[0] = 21 [ 53.216401] IPVS: ftp: loaded support on port[0] = 21 [ 53.318365] IPVS: ftp: loaded support on port[0] = 21 [ 53.429776] IPVS: ftp: loaded support on port[0] = 21 [ 53.571205] IPVS: ftp: loaded support on port[0] = 21 [ 53.756464] IPVS: ftp: loaded support on port[0] = 21 [ 54.700849] ip (4684) used greatest stack depth: 54000 bytes left [ 55.500902] ip (4747) used greatest stack depth: 53928 bytes left [ 55.874304] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.880813] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.915711] device bridge_slave_0 entered promiscuous mode [ 56.175259] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.181763] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.211793] device bridge_slave_1 entered promiscuous mode [ 56.345895] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.352400] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.393388] device bridge_slave_0 entered promiscuous mode [ 56.465734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.505722] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.512213] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.525982] device bridge_slave_0 entered promiscuous mode [ 56.554944] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.561521] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.596665] device bridge_slave_0 entered promiscuous mode [ 56.626350] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.632835] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.651942] device bridge_slave_1 entered promiscuous mode [ 56.687074] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.693572] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.715162] device bridge_slave_0 entered promiscuous mode [ 56.778619] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.786648] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.793117] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.809465] device bridge_slave_1 entered promiscuous mode [ 56.824180] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.830676] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.864155] device bridge_slave_1 entered promiscuous mode [ 56.897621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 56.934571] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.941121] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.977348] device bridge_slave_1 entered promiscuous mode [ 57.031715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.042892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.084324] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.090827] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.123408] device bridge_slave_0 entered promiscuous mode [ 57.149874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.195447] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.215502] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.271956] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.288310] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.294854] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.336753] device bridge_slave_1 entered promiscuous mode [ 57.416351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.454596] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.461153] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.502073] device bridge_slave_0 entered promiscuous mode [ 57.547387] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.563528] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.575893] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.582428] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.602509] device bridge_slave_0 entered promiscuous mode [ 57.750365] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.756871] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.787191] device bridge_slave_1 entered promiscuous mode [ 57.802802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 57.839542] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.851833] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 57.862118] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 57.871374] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.877840] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.909877] device bridge_slave_1 entered promiscuous mode [ 57.943190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 57.952374] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.043705] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.080124] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.088823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.102548] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.109569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.145263] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.166471] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.194408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.309451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.316470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.332555] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.347974] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.354971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.375852] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.385208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.392279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.452736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.459725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.525179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 58.533466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 58.542549] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.560701] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.570387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.651304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.658856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.678423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.694261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.718730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 58.726395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.844176] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 58.926194] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.012609] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.088015] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.095016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.208223] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.228318] team0: Port device team_slave_0 added [ 59.246539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.274281] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.283178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.290958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.321964] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.343163] team0: Port device team_slave_0 added [ 59.369969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.382163] team0: Port device team_slave_0 added [ 59.405811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.425453] team0: Port device team_slave_0 added [ 59.468358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.475929] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.493920] team0: Port device team_slave_0 added [ 59.517751] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.529469] team0: Port device team_slave_1 added [ 59.556570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.571316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.578705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.601883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.626303] team0: Port device team_slave_1 added [ 59.644094] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.668634] team0: Port device team_slave_1 added [ 59.677281] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.688645] team0: Port device team_slave_1 added [ 59.706912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.723602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.763526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.776505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 59.802384] team0: Port device team_slave_1 added [ 59.822792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.836952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 59.858210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.865238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.876890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.889879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 59.911866] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 59.943175] team0: Port device team_slave_0 added [ 59.968319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 59.988355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.022768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.036500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.070638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.085234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.101413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.119389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.126948] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.136469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.143355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.159958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.188388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.211431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.227351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.244955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.269783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.282911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.299187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.306237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.320494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.343601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.362215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.380730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.391650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.403161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.412355] team0: Port device team_slave_1 added [ 60.422896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.435930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 60.443146] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.453536] team0: Port device team_slave_0 added [ 60.466323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.490685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.516110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.537020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.564212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.574166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.588224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.612420] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.622460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.631811] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 60.647225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 60.656939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.678187] team0: Port device team_slave_0 added [ 60.685460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.695080] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.707289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.745016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.781361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.810281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.829664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.837950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.846170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.853788] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.862112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.871666] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.879820] team0: Port device team_slave_1 added [ 60.900543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.918615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.936272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.956779] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 60.964310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.979444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.997225] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.004292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.022262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.044903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.055243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.074668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.092748] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.107206] team0: Port device team_slave_1 added [ 61.141369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.148410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.169735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.195951] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.215743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.246825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.344233] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.351434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.364449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.401827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.411329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.432202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.475350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.487251] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.513695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.546959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.556701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.580408] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.639953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.647589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.664383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.772600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.781790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.804996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.864395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 61.876145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.901973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.015128] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.025156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.045272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.275700] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.282187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.289090] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.295559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.321950] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.332766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.371633] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.378196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.385069] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.391513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.465847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.478089] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.484556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.491387] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.497815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.558506] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.579998] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.586475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.593341] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.599809] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.612545] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 63.821195] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.827695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.834525] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.840988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.852161] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.031320] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.037811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.044671] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.051143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.073734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.354152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.371883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.408739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.440707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.458510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.491240] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.497746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.504664] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.511172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.533784] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.723535] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.730103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.736970] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.743435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.778939] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.375320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.389824] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 72.263983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.296500] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.454231] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.534386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.942731] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.084254] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.191390] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.224532] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.271485] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.334376] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.667743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.747665] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.850866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.899384] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 73.905711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 73.931884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.984186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.079189] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.085483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.097882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.124419] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.135579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.168142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.211772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.218728] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.237994] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.587134] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.593435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.608100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.627132] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.677553] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 74.793367] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.848463] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 74.858506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.866316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.897655] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.084105] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.118621] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.387092] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.591717] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.598734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.617570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.641523] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.651240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.665559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.702669] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.374883] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.524663] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/27 15:26:11 executing program 6: ioprio_get$pid(0x2, 0x0) 2018/04/27 15:26:11 executing program 1: io_cancel(0x0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000140)}, &(0x7f0000001180)) 2018/04/27 15:26:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r1 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000180), 0x455) close(r1) 2018/04/27 15:26:11 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x364e}) fcntl$lock(r1, 0x26, &(0x7f0000000140)={0x8000000000000001}) dup3(r0, r1, 0x0) 2018/04/27 15:26:13 executing program 7: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) writev(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)="bc5094d859b3cb03", 0x8}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0xfffffffeffffffff, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/27 15:26:13 executing program 2: r0 = memfd_create(&(0x7f0000000140)="736563757269747d917617cb0e3dbe4574656f00", 0x0) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000000000), 0xb516) lseek(r0, 0xf747000000000000, 0x3) fchmod(r0, 0x0) 2018/04/27 15:26:13 executing program 5: clone(0x0, &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000180), &(0x7f0000000100)) semop(0x0, &(0x7f0000020fe8)=[{0x0, 0x4000000000081}], 0x1) 2018/04/27 15:26:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000002380)='gfs2\x00', &(0x7f00000023c0)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x6000, &(0x7f0000002500)) 2018/04/27 15:26:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000ddff8), 0x0) 2018/04/27 15:26:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a"}) socket$packet(0x11, 0x3, 0x300) 2018/04/27 15:26:13 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019ff8)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r1, 0x8000000000000007, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x364e}) fcntl$lock(r1, 0x26, &(0x7f0000000140)={0x8000000000000001}) dup3(r0, r1, 0x0) 2018/04/27 15:26:13 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) writev(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)="bc5094d859b3cb03", 0x8}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0xfffffffeffffffff, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/27 15:26:13 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) writev(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)="bc5094d859b3cb03", 0x8}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0xfffffffeffffffff, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/27 15:26:14 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=""/255}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x9, 0x1a, 0xffffffff}, 0x2c) 2018/04/27 15:26:14 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000001440)={&(0x7f0000000340)=@bridge_dellink={0x20, 0x11, 0x0, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) 2018/04/27 15:26:14 executing program 4: ppoll(&(0x7f0000000280), 0x0, &(0x7f00000003c0), &(0x7f0000000340), 0x8) modify_ldt$read(0x0, &(0x7f0000000040)=""/34, 0x22) 2018/04/27 15:26:14 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x95d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0), 0x0, 0x0) 2018/04/27 15:26:14 executing program 7: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000000)) 2018/04/27 15:26:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "000000000100000000001bf3ffffff000065000000edff00007db0e6330ee7f9b319d8000018e58d1c43473000e05026fb0000008001d1a7335d5bffff0001d7", "ce865c8ad573dfad67050000001000003302fb86960a1837820ade837f360200"}) 2018/04/27 15:26:14 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x2, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffd, 0x8) writev(r0, &(0x7f0000000540)=[{&(0x7f00000001c0)="bc5094d859b3cb03", 0x8}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0xfffffffeffffffff, 0x8) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/108, 0x6c}], 0x1) 2018/04/27 15:26:14 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x15, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/27 15:26:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100), 0x4) 2018/04/27 15:26:14 executing program 6: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x1d, 0x0, 0x0, &(0x7f0000000000)) 2018/04/27 15:26:14 executing program 7: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x5, 0x0, 0x0, &(0x7f0000000000)) 2018/04/27 15:26:14 executing program 0: socketpair$inet(0x2, 0x80803, 0x10002, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r1 = accept4(r0, &(0x7f00000001c0)=@nfc, &(0x7f0000000000)=0x80, 0x80000) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) unshare(0x20000000) r2 = syz_open_dev$loop(&(0x7f0000c17ff5)='/dev/loop#\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r3, @ANYBLOB="00022dbd7000fddbdf250800000008000600070000003000030014000600fe8000000000000000000000000000aa080001000100000008000800ff0000f807000500ac1414aa4800010008000800030000000c0007002b000000300000000c000700200000001800000014000300ffffffff00000000000000000000000008000600727200000800080003000000080004006e0000001400020008000400ff0f00000800030004000000d8df1d61d5f668c0b3e687b9d4ebf1bfc162771e369a2a44d39bbec032ec663ea22f4dc20f34666a8813b457d0471e339ac82477875b0dda54a20b5e8685191eac6e45d31f9db25cfb968c1d1f7a3c35d8100912599500510039b6b717ac0f17fc470b888ae89d08476ecd01f85d8fa54a5e20efe5948dc2f647045a6c310cb900b506532155673a5169fa1e37c027009872a0a8000751f4ea5ad395858aefbdb9d9b504d6096b50e4f6beb5e324bf97b29f0824ea097235b043de1efeb6ed207bd087f9a769d0a9472f4c94a4afba0d416a28076b093721cf8ceed24d2ed570cf5c6afa483e98062f099290dbcb8427d1f9"], 0xb0}, 0x1, 0x0, 0x0, 0x8004}, 0x8001) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3ff, 0x9, 0x0, 0x16, 0x9, 0x1, "6946f43a3e0f59339f899a14bfe50bfcb91ef869f978ac28e730af8ce8f83a1807c93c2f338ad785e70d68e7a70200e32ae1cdd50831ce6f340d3c58430b8587", "67201c519e3c7730da365078a97ad0219404c80848943f3263d0a85669bdc0d94e6a742106a8929f3e324622f8040d1e9c1795c2ddd0961504087df7045c543c", "438e612b195b26850961f743c64855a81ba380fcd7623673c5a3954de2dcb95f", [0x4, 0x1a1c]}) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f00000003c0)="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") 2018/04/27 15:26:14 executing program 3: r0 = socket$inet6(0xa, 0x7, 0x9108) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x2) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000740)=[{0x10}, {0x38, 0x117, 0x2, "21490b094545c03f374804908c344f68df97c84555e379421b1af68e380adf40c06ae6bbf458"}, {0x100, 0x29, 0x100, "8e58c690808d374d17b632538a9d7d1fb92a804ea44b8d989d877f2cac9f6e75c68ce09a75b4740cb3a45dc1eb27e47a030af373a5c2bb60b606790cda35db50becb1acbeb483409b6506e304b22f730627b40bed2135f7d1ee67492a6d9cd1ede490c0cf273fdd4a0ba99cea03d760ef709705b6b4f0bc4bc5c1e8a18f323e1a71d495d56e68e856ec603361aece4812d3f731ca644ca44f3bac682d1325c9195b3bc1fd4e9166146e1455f6ed24894338a3cbe8ec087d0ba70a6e61fd79f1f04cfc1d459b4ec5ed4e6939c8656fbfbda92328eaa5678b10388ed50ecbc30114cad44a2c9de5dce2697c0"}, {0x100, 0x0, 0x9, "cfb48bdb23b5c4e5928cf931e69ed53b83585e0ef1444f45474b5738be878e98a4498066a7caba4c599acff1de5e51cbe9891464e97e87e1e5a3e27db4df965b09df3391e025d87dce9ac36a458f100aef0c60bd6edd30657cdfc682637ac9e60c8a4d9adc87d5a22d094af940b5529015dba49bd45cdc8180337db4a5897b82adb183079b7238e4c7d17862ad69742b8517eed46cb8cbebb7ab641374e28164385b9afad402bcc88dea4659e3e99511c85f8d476d1e4da4203983fa4e25a83cbfbee21e34554514ec6fe1d859f8fd6df0474f115277c3aba0626cbe6dba46877b168031b441deefbb8d4e"}], 0x248, 0x800}, 0x0) dup3(r0, r0, 0x80000) 2018/04/27 15:26:14 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x15, 0xfffffffb, 0x0, &(0x7f0000000000)) 2018/04/27 15:26:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='statm\x00') lseek(r0, 0x0, 0x1) [ 83.550528] can: request_module (can-proto-0) failed. 2018/04/27 15:26:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) [ 83.649970] can: request_module (can-proto-0) failed. [ 83.909324] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™àc?_ΨûZUØ»¤Ù Ç¡$ج9­Ñ=É:€ò/ùý5¨Dóèµ­äå“Q7¯oâQ4C]) failed (rc=-13) [ 83.950515] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/27 15:26:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) 2018/04/27 15:26:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000200)}], 0x0, &(0x7f0000000b40)) 2018/04/27 15:26:15 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) 2018/04/27 15:26:15 executing program 4: mlock(&(0x7f0000838000/0x4000)=nil, 0x4000) 2018/04/27 15:26:15 executing program 7: unshare(0x8000400) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140), 0x0) 2018/04/27 15:26:15 executing program 2: msgctl$IPC_STAT(0x0, 0x2, &(0x7f00000000c0)=""/53) 2018/04/27 15:26:15 executing program 1: get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 2018/04/27 15:26:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000001440)={&(0x7f0000000340)=@bridge_dellink={0x20, 0x11, 0x0, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) 2018/04/27 15:26:15 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000001440)={&(0x7f0000000340)=@bridge_dellink={0x20, 0x11, 0x0, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) 2018/04/27 15:26:15 executing program 2: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) clock_gettime(0x0, &(0x7f0000460000)) 2018/04/27 15:26:15 executing program 7: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f00000008c0)='./file0\x00', 0x0) 2018/04/27 15:26:15 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) dup2(r0, r1) 2018/04/27 15:26:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0xfa}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0xf, 0xfffffffb, 0x4, &(0x7f0000000000)) 2018/04/27 15:26:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000000)=""/248, &(0x7f0000000100)=0xf8) [ 84.561478] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™àc?_ΨûZUØ»¤Ù Ç¡$ج9­Ñ=É:€ò/ùý5¨Dóèµ­äå“Q7¯oâQ4C]) failed (rc=-13) 2018/04/27 15:26:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2=0xe0000002}, 0x10) 2018/04/27 15:26:15 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000ffbf47)=""/185, 0x2bd, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) [ 84.854350] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/27 15:26:16 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000)=0x2, 0x4) bind$inet(r0, &(0x7f0000bf4000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00009ef000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0xd0]}, 0x10) 2018/04/27 15:26:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 2018/04/27 15:26:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "64b697", 0x30, 0x3a, 0x0, @local={0xfe, 0x80, [], 0xaa}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "9f1b19", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}}}}}}}}, &(0x7f0000000380)={0x0, 0x2, [0x0, 0xe31]}) 2018/04/27 15:26:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) 2018/04/27 15:26:16 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000080)=0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/139, 0x8b) r2 = syz_open_dev$dspn(&(0x7f0000af6ff6)='/dev/dsp#\x00', 0x1, 0x0) readv(r2, &(0x7f0000003fd0)=[{&(0x7f0000006f07)=""/249, 0xf9}], 0x1) ioctl$int_in(r2, 0x80000000005001, &(0x7f0000003ff8)) 2018/04/27 15:26:16 executing program 7: r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000ffbf47)=""/185, 0x2bd, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000fc8000)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/27 15:26:16 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) 2018/04/27 15:26:16 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f0000001440)={&(0x7f0000000340)=@bridge_dellink={0x20, 0x11, 0x0, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) 2018/04/27 15:26:16 executing program 2: syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000180)={0x20, 0x2e, 0x6fd, 0x0, 0x0, {0x2003}, [@nested={0xc, 0x0, [@typed={0x8, 0x9, @ipv4}]}]}, 0x20}, 0x1}, 0x0) 2018/04/27 15:26:16 executing program 1: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000000), 0x0) 2018/04/27 15:26:16 executing program 6: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00006da000)=0x2, 0x4) bind$inet(r0, &(0x7f0000bf4000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00009ef000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0xd0]}, 0x10) 2018/04/27 15:26:16 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000003100)={'IDLETIMER\x00'}, &(0x7f0000003140)=0x1e) [ 85.951529] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™àc?_ΨûZUØ»¤Ù Ç¡$ج9­Ñ=É:€ò/ùý5¨Dóèµ­äå“Q7¯oâQ4C]) failed (rc=-13) 2018/04/27 15:26:17 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/if_inet6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x4, 0x800400000fd) 2018/04/27 15:26:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) accept4$unix(r0, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) 2018/04/27 15:26:17 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) [ 86.128868] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/27 15:26:17 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000040)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) dup3(r2, r1, 0x0) 2018/04/27 15:26:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000c45ff8)={0xffffffffffffffff, 0xffffffffffffffff}) read(r3, &(0x7f0000d48000)=""/1, 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x3f) fcntl$setown(r2, 0x8, r1) fcntl$setsig(r2, 0xa, 0x12) dup2(r2, r3) tkill(r1, 0x16) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.stat\x00', 0x2761, 0x0) 2018/04/27 15:26:17 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/if_inet6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x4, 0x800400000fd) 2018/04/27 15:26:17 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00001b3000)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 2018/04/27 15:26:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) bind(r1, &(0x7f0000d01ff0)=ANY=[], 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="8a", 0x1}], 0x1) close(r0) msgsnd(0x0, &(0x7f0000001080)=ANY=[], 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1, 0x8000000000000000, 0x0) 2018/04/27 15:26:17 executing program 7: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000001c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000024c0), 0x111}}, 0xfffffd71) write$rdma_cm(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="03000000400000fa0a0000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000ffff7f00000100000000", @ANYBLOB="e9ffffff3c29d2d41be33942de819463f5e270547c9baf2b99c04b2c020a5a99ad1883eeb83329f277f01d352a0e5fdb074c96d0b670ce28bce87ec9b1c5ddff716ab52eb0cfb7d1b686b7e95c3e3d93e2d2748a63fd456c639c29ccb3f7a1eb06eb0beecb75cdca780a4c2f9437e631b126862a4e48b5815444009b21432cac027dac37f134def90a35d9ec34109e15ed57aaf0acaabbc26e78a9bbb0e8f7d10c002135b7507ddf5a3000a950f79ca73f9339e642"], 0xf5) 2018/04/27 15:26:17 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x1, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/182) 2018/04/27 15:26:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000000)='ghreaded\x00', 0x1) 2018/04/27 15:26:17 executing program 7: r0 = socket$inet6(0xa, 0x2000000802, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved=0x1}, 0x10) 2018/04/27 15:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x100000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 2018/04/27 15:26:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x2}}) 2018/04/27 15:26:17 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/27 15:26:17 executing program 5: setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000400), 0x8) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x800000000000003, 0x300) getsockname(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f00000001c0)=0x80) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x0) 2018/04/27 15:26:18 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/27 15:26:18 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680)}, 0x0) 2018/04/27 15:26:18 executing program 3: getgid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) [ 87.244718] alg: No test for cbcmac(des) (cbcmac(des-generic)) 2018/04/27 15:26:19 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002c80)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in=@broadcast, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003000)=0xe8) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo\x00') fchdir(r0) umount2(&(0x7f0000000040)='./0ile0\x00', 0x0) 2018/04/27 15:26:19 executing program 1: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x10004020) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x9) 2018/04/27 15:26:19 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x0) 2018/04/27 15:26:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x10000005) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:19 executing program 7: r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000280)) 2018/04/27 15:26:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000040)=ANY=[]) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) ioctl$LOOP_CTL_ADD(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) 2018/04/27 15:26:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005d80)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000005d40)={&(0x7f0000000380)=@bridge_dellink={0x20, 0x11, 0x301, 0x0, 0x0, {0x7}}, 0x20}, 0x1}, 0x0) 2018/04/27 15:26:19 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) read(r2, &(0x7f0000000040)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) dup3(r2, r1, 0x0) 2018/04/27 15:26:19 executing program 1: socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) getgid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/27 15:26:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) getgid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) 2018/04/27 15:26:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x10000005) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:19 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) 2018/04/27 15:26:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:26:19 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 2018/04/27 15:26:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000040)=ANY=[]) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) ioctl$LOOP_CTL_ADD(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) 2018/04/27 15:26:19 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 2018/04/27 15:26:19 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000140)=""/163, 0xa3) 2018/04/27 15:26:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:26:19 executing program 6: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x5) 2018/04/27 15:26:19 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1ea) 2018/04/27 15:26:19 executing program 3: socketpair$inet6(0xa, 0x2, 0x4, &(0x7f0000000000)) 2018/04/27 15:26:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000040)=ANY=[]) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) ioctl$LOOP_CTL_ADD(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) 2018/04/27 15:26:19 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000001380)='/dev/snd/seq\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000001480)=@random={'trusted.', '{\x00'}) 2018/04/27 15:26:19 executing program 1: ioprio_set$pid(0x2, 0x0, 0x4001) 2018/04/27 15:26:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) 2018/04/27 15:26:20 executing program 6: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)=""/4096, 0x3f6) 2018/04/27 15:26:20 executing program 7: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) 2018/04/27 15:26:20 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') 2018/04/27 15:26:20 executing program 2: mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000ccb000)='./bus\x00', 0x0) open(&(0x7f0000043000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000272ffa)='./bus\x00', 0x0, 0x0) 2018/04/27 15:26:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x800454d3, &(0x7f0000000040)=ANY=[]) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030efee)='/dev/loop-control\x00', 0x0, 0x0) shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) ioctl$LOOP_CTL_ADD(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c80, 0x0) 2018/04/27 15:26:20 executing program 3: getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xffffffffffffffff]) setfsgid(r0) 2018/04/27 15:26:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x4}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:20 executing program 7: r0 = socket(0x18, 0x0, 0x1) recvmmsg(r0, &(0x7f0000002340), 0x0, 0x0, &(0x7f0000002400)) 2018/04/27 15:26:20 executing program 6: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') 2018/04/27 15:26:21 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r0, &(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0) 2018/04/27 15:26:21 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) 2018/04/27 15:26:21 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)) 2018/04/27 15:26:21 executing program 3: r0 = userfaultfd(0x0) close(r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x7fffdffee000}, 0x1}) 2018/04/27 15:26:21 executing program 7: statfs(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/110) 2018/04/27 15:26:21 executing program 0: mprotect(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x0, 0x0) 2018/04/27 15:26:21 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)) 2018/04/27 15:26:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000540)) 2018/04/27 15:26:21 executing program 2: r0 = socket(0x18, 0x0, 0x1) recvmmsg(r0, &(0x7f0000002340)=[{{&(0x7f00000020c0)=@in6, 0x80, &(0x7f0000002280), 0x0, &(0x7f00000022c0)=""/114, 0x72}}], 0x1, 0x0, &(0x7f0000002400)) 2018/04/27 15:26:21 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f0000000300), 0x1000, &(0x7f0000000740)=ANY=[]) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./bus\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000240), 0x0, 0xcbe}], 0x0, &(0x7f0000000380)=ANY=[]) r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) read(r0, &(0x7f0000000100)=""/57, 0x39) 2018/04/27 15:26:21 executing program 7: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) 2018/04/27 15:26:21 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) 2018/04/27 15:26:21 executing program 6: renameat2(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x3) 2018/04/27 15:26:21 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000000080)=""/21, &(0x7f00000000c0)=0x15) 2018/04/27 15:26:21 executing program 4: r0 = mq_open(&(0x7f0000000080)='#\x00', 0x0, 0x0, &(0x7f00000000c0)) mq_timedsend(r0, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)) 2018/04/27 15:26:21 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) 2018/04/27 15:26:21 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$notify(r0, 0x402, 0x10) 2018/04/27 15:26:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/27 15:26:21 executing program 0: kexec_load(0x0, 0x6, &(0x7f0000002340)=[{&(0x7f0000000100)}, {}, {&(0x7f0000000200)}, {&(0x7f00000002c0)}, {&(0x7f00000012c0)}, {&(0x7f00000022c0)}], 0xb0000) 2018/04/27 15:26:21 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) 2018/04/27 15:26:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:21 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000002340), 0x0, 0x0, &(0x7f0000002400)) [ 90.752857] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 2018/04/27 15:26:21 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000000)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:21 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) 2018/04/27 15:26:21 executing program 2: mremap(&(0x7f00002ac000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f00009e8000/0x2000)=nil) 2018/04/27 15:26:21 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f000002efe2)=[{0x0, 0x4}], 0x1) semop(0x0, &(0x7f000001a000)=[{}, {}], 0x2) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000000)=[0x0]) 2018/04/27 15:26:21 executing program 6: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001980)='/dev/hwrng\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/245, 0xf5}], 0x1, 0x0) 2018/04/27 15:26:21 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8000000000000007) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0xe) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2}, @random="7d73cf61100f", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast=0xffffffff}, @igmp={0x12, 0x0, 0x0, @multicast2=0xe0000002}}}}}, &(0x7f0000000000)) [ 91.033527] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 2018/04/27 15:26:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0xa9, "2ce55a31b1f0360979d589da0a6f91007b66046e7f7536b7c00e2f7da0489501eb5ca12bcd541da373259f5294b81cab9c330f73cf35683e8025453ce523e5e04c9e6c4320778b24f52e9fc94dbfea485277fb6a38935079c4a68a604688d8c10eaa229ff96d3062eaa1583b6c45df8c711dc5624a2b18baca548a37d3f9f13ec70fedefd1573d4ee172bcfcaa8ec93594259e0f31e3b5720b5b5ffac0db7cebdca1de98b432aa9f64"}, &(0x7f0000000140)=0xcd) 2018/04/27 15:26:22 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:22 executing program 6: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x30c) 2018/04/27 15:26:22 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) 2018/04/27 15:26:22 executing program 2: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) [ 91.572172] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 2018/04/27 15:26:23 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000596000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000580)=0x7) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000de0000)=[{&(0x7f0000683000)="e9", 0x1}], 0x1) read(r0, &(0x7f0000000000)=""/186, 0xba) 2018/04/27 15:26:23 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x10000008084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002b80)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002bc0)={0x0, @loopback=0x7f000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) 2018/04/27 15:26:23 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000880)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000580000)={0x0, 0x200000000000012, 0x0, @thr={&(0x7f0000f44000), &(0x7f0000ff5fd2)}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000380)={0x0}) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)={r0}, 0x8) r1 = getpgid(0x0) tkill(r1, 0x1000000000016) 2018/04/27 15:26:23 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000003f80)={0x1, {{0x2, 0x4e20, @multicast2=0xe0000002}}}, 0x88) 2018/04/27 15:26:23 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) 2018/04/27 15:26:23 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:23 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:23 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x2, 0x100011, r0, 0x0) mkdir(&(0x7f0000017ff6)='./control\x00', 0x0) r1 = open(&(0x7f000003dff6)='./control\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0), 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f00000014c0)) getdents(r1, &(0x7f0000006b00)=""/117, 0x75) 2018/04/27 15:26:24 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10080000000010, 0x803, 0x0) write(r0, &(0x7f0000000200)="260000002a0029d10701c1eb448974000000040001000000000000000002cb0000000000e9ff", 0x26) 2018/04/27 15:26:24 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f0000000100)}, {&(0x7f0000002440)='x', 0x1}], 0x2, 0x0) [ 93.147440] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 2018/04/27 15:26:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:24 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1e7000)=nil, 0x1e7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x486, &(0x7f000048ffe8)=""/24, &(0x7f00001e6000)=0x18) 2018/04/27 15:26:24 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1=0xe0000001}, @igmp={0x12}}}}}, &(0x7f00003b5000)) 2018/04/27 15:26:24 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) socket$packet(0x11, 0x0, 0x300) 2018/04/27 15:26:24 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000002440)='x', 0x1}], 0x1, 0x0) 2018/04/27 15:26:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:24 executing program 5: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000040)) 2018/04/27 15:26:24 executing program 6: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1e7000)=nil, 0x1e7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x486, &(0x7f000048ffe8)=""/24, &(0x7f00001e6000)=0x18) [ 93.771498] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™àc?_ΨûZUØ»¤Ù Ç¡$ج9­Ñ=É:€ò/ùý5¨Dóèµ­äå“Q7¯oâQ4C]) failed (rc=-13) 2018/04/27 15:26:25 executing program 2: r0 = syz_open_dev$tun(&(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x22e}) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'nr0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6}, 0x10) close(r0) 2018/04/27 15:26:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000500)="1f000000520007f200934e060b3f405a6100b2fef5000f430aa9f07e130586", 0x1f) 2018/04/27 15:26:25 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000002440)='x', 0x1}], 0x1, 0x0) 2018/04/27 15:26:25 executing program 5: sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) bind(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x80) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), 0x4) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 94.740855] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/27 15:26:26 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000002440)='x', 0x1}], 0x1, 0x0) 2018/04/27 15:26:26 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:26 executing program 6: open(&(0x7f0000000000)='./bus\x00', 0x100000141842, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f0000000480)='./bus\x00', 0x0, 0x0, &(0x7f00000006c0), 0x1000, &(0x7f0000000740)=ANY=[]) r0 = open(&(0x7f0000002000)='./bus\x00', 0x44006, 0x0) r1 = dup(r0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1a, 0x0, 0x8, "7b6d8ae7de72c7e499c060637411d8e740aa6f1e0fe1e77e1d87e27b11d2b54463671a60f1869b60191a7f23a0fcb259216157a004498d7c681be6fa2558d65f", "a20a6db2b3ea9c1c2b8afa0afbb7257afd8305d9c6773858882d5599f672dc2e2cca8dde794c08de253affd3f6f2ba3c50c550ffdeca7c7d2828941a7df82097", "d82894e7cae7cacbf3bc48dd41a944e98340e16bf24503816c3ffb53f42802b2", [0x67]}) 2018/04/27 15:26:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000500)="1f000000520007f200934e060b3f405a6100b2fef5000f430aa9f07e130586", 0x1f) 2018/04/27 15:26:26 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:26 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x490, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x8c) 2018/04/27 15:26:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) socket$packet(0x11, 0x0, 0x300) 2018/04/27 15:26:26 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) socket$packet(0x11, 0x0, 0x300) 2018/04/27 15:26:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x101902) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="aa", 0x1}], 0x1, 0x81003) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) accept4$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000180)=0x6e, 0x80000) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000001) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0xf, 0xd, "6df1733d7a8a242fd899e0633f5fcea8fb5a550ed80ebba4d909c7a124d8ac39add13dc93a80f22ff9fd35a844f3e8b5ade4e5935137af6fe251190634435dca", "6aaba7a936009867bd21673a08478220febadc5ca0c0caf1f4833b9ff18a89a285f049691fdaee090426b5018b54096bdaacf1e7a2fb27febc2e8d7b46599493", "ecd2881042e088581e6e599a5591e6c882e32e7ea6697b93d32112b2bc83d72a", [0x0, 0x9]}) socket$packet(0x11, 0x0, 0x300) [ 95.570369] loop_reread_partitions: partition scan of loop0 (mñs=zŠ$/Ø™àc?_ΨûZUØ»¤Ù Ç¡$ج9­Ñ=É:€ò/ùý5¨Dóèµ­äå“Q7¯oâQ4C]) failed (rc=-13) [ 96.784761] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2018/04/27 15:26:28 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}], 0x1, 0x0) 2018/04/27 15:26:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)}}], 0x1, 0x0) 2018/04/27 15:26:28 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 2018/04/27 15:26:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x109, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 2018/04/27 15:26:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:28 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r0, &(0x7f0000000140)="0401000000c000ddb8460900ffb25b4202938207d9033780398d5375c5f73f939029ef0712f295136fcff575903376b15cddc7d07a033b978920a42f2a2bb404e1b50400000000000000f55d4626a880be8bc3cfaeba524830be0ea863", 0x5d, 0x0, &(0x7f0000000000)={0xa, 0x200000800, 0x2000000000d}, 0x1c) 2018/04/27 15:26:28 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:28 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x7f}, 0x1c) [ 97.074497] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 2018/04/27 15:26:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x22) 2018/04/27 15:26:29 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:29 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}], 0x1, 0x0) 2018/04/27 15:26:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x801) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0xa011}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={"69666230000091785a1e7a275fa500", 0x1301}) write$binfmt_aout(r1, &(0x7f0000000280), 0x20) 2018/04/27 15:26:29 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x11, 0x0, 0x0) 2018/04/27 15:26:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:29 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 2018/04/27 15:26:29 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 98.794475] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 98.800849] device ifb0 entered promiscuous mode 2018/04/27 15:26:30 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:30 executing program 2: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000f9cffb)='proc\x00', 0x0, &(0x7f0000cde000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/250, 0xfa) getdents64(r0, &(0x7f00000001c0)=""/1679, 0x68f) 2018/04/27 15:26:30 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000002540)=[{&(0x7f0000000100)}], 0x1, 0x0) 2018/04/27 15:26:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x17ffc, 0x0) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0), 0x33040, &(0x7f0000000700)) 2018/04/27 15:26:30 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 2018/04/27 15:26:30 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:30 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xf, 0x8000000000004, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/04/27 15:26:30 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 2018/04/27 15:26:30 executing program 2: r0 = memfd_create(&(0x7f0000000000)='GPLvmnet1@\x00', 0x3) write(r0, &(0x7f0000000240)='v', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) fcntl$addseals(r0, 0x409, 0xc) fsetxattr(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='s'], &(0x7f0000000080)='GPLvmnet1@\x00', 0xb, 0x0) fchdir(0xffffffffffffffff) 2018/04/27 15:26:32 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/149, &(0x7f00000000c0)=0x95) 2018/04/27 15:26:32 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:32 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 2018/04/27 15:26:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) readahead(r1, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102001300) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast=0xffffffff, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x1b5f, 0x5, 0x0, 0x4}, {0x0, 0x5, 0x4, 0x800}, 0x5, 0x6e6bb6, 0x1}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}}, 0xa, @in6, 0x3504}}, 0xe8) 2018/04/27 15:26:32 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x8204, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 2018/04/27 15:26:32 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/27 15:26:32 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x0, 0x0, 0xff, 0x1}, 0x22) 2018/04/27 15:26:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xf}]}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000200)={'bridge0\x00', &(0x7f0000000040)=ANY=[]}) 2018/04/27 15:26:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/27 15:26:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) 2018/04/27 15:26:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0xf}]}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000200)={'bridge0\x00', &(0x7f0000000040)=ANY=[]}) 2018/04/27 15:26:32 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) connect$rds(r0, &(0x7f0000000100)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) 2018/04/27 15:26:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) readahead(r1, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f00000ddff8), 0x102001300) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast=0xffffffff, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x1b5f, 0x5, 0x0, 0x4}, {0x0, 0x5, 0x4, 0x800}, 0x5, 0x6e6bb6, 0x1}, {{@in=@remote={0xac, 0x14, 0x14, 0xbb}}, 0xa, @in6, 0x3504}}, 0xe8) 2018/04/27 15:26:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ab9ff4)) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000f66ffc)=0xe6) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000140)) 2018/04/27 15:26:34 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:34 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x20000000000}) 2018/04/27 15:26:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:34 executing program 1: ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000300)}) 2018/04/27 15:26:34 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr}}, 0x1c) 2018/04/27 15:26:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ab9ff4)) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000f66ffc)=0xe6) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000140)) 2018/04/27 15:26:34 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="2400000026007f000000000000007701000000ff010000004bc8cfbeffffffffa860e7f6", 0x24) 2018/04/27 15:26:34 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c40)={0x3f, 0x8, 0x2, 0x8, r5}, 0x10) 2018/04/27 15:26:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:34 executing program 2: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) 2018/04/27 15:26:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:34 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000140)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000880), 0x0, &(0x7f0000000940)=""/146, 0x92}, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)) r0 = getpgrp(0x0) sched_setaffinity(r0, 0x1, &(0x7f0000000100)) 2018/04/27 15:26:34 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@dev={0xfe, 0x80}}, 0x14) 2018/04/27 15:26:34 executing program 2: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x100000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x400000002}, 0x1c) sendmmsg(r0, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)}}], 0x1, 0x0) 2018/04/27 15:26:34 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff2000000000000010000000a00000000000000ff4e0000000000000000000000000001100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffe595354bbafa57589c421253600009b58fd11076f39ca00000000000000000000000000000000000000000000"], 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) 2018/04/27 15:26:34 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000d40)={r4, 0x70, "ce176c9b2f6676cd423ee27db8658f35d1e2d14de83522fa72a230f7578b2c0581ac06760150479238121c4e3c797fca6bf6fbd674a013f7edfb931d8dcd2bbc088d7353a24978175ff339245af8ea90b63f83ff43a7c914ba2e06d7015d103500000000000000000000000000000000"}, &(0x7f0000001100)=0x78) [ 103.697832] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) 2018/04/27 15:26:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f00000001c0)={0x2, 0x80000}) dup3(0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r3 = dup3(r2, r1, 0x0) write$cgroup_subtree(r3, &(0x7f00000001c0)=ANY=[], 0xffffffffffffffc6) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[], 0xfe48) fsync(r1) 2018/04/27 15:26:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:36 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000001140)={0x0, 0x9}, &(0x7f0000001180)=0x8) 2018/04/27 15:26:36 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:36 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000000)={&(0x7f00000000c0)}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000080), 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) 2018/04/27 15:26:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x100000006, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000040)) 2018/04/27 15:26:36 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, r2, 0x0) open(&(0x7f0000003c80)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40086410, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) sendfile(r3, r1, &(0x7f0000014000), 0x4000800000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000764ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0045405, &(0x7f0000b18000)) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000080), 0x4) 2018/04/27 15:26:36 executing program 5: timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) prctl$intptr(0x1d, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080), 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000380)={'filter\x00', 0x7, 0x4, 0x478, 0x0, 0x254, 0x0, 0x394, 0x394, 0x394, 0x4, &(0x7f0000000000), {[{{@arp={@loopback=0x7f000001, @rand_addr, 0x0, 0x0, @empty, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0x0, 0xff, 0xff, 0xff]}, 0xc8, 0x800, 0x120000, 0x2f3, 0xfffffffffffffffa, 0xffffffff, 'ip6tnl0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x351}, 0xf0, 0x114}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, @broadcast=0xffffffff, @multicast1=0xe0000001, 0x2, 0xffffffff}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @multicast2=0xe0000002, 0xffffff00, 0xffffffff, @empty, {[0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, {[0xff, 0x0, 0xff, 0xff]}, 0x800, 0xffff, 0x4, 0x0, 0x5, 0xe4, 'team_slave_1\x00', 'erspan0\x00', {}, {0xff}, 0x0, 0x201}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2=0xe0000002, @local={0xac, 0x14, 0x14, 0xaa}, 0x4}}}], {{[], 0xc0, 0xe4}, {0x24, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c4) 2018/04/27 15:26:36 executing program 1: chroot(&(0x7f0000000080)='../file0\x00') 2018/04/27 15:26:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:36 executing program 4: socket(0x0, 0x0, 0x0) 2018/04/27 15:26:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x3f) sendmmsg(r0, &(0x7f000000a700)=[{{0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000b80)}}], 0x1, 0x0) 2018/04/27 15:26:36 executing program 5: socket(0x0, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 105.534049] hrtimer: interrupt took 1032290 ns 2018/04/27 15:26:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:36 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00002c5fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="99921af2ce9576ecfce6225034e249a12a7e4791e6beb77e1159c6e1a39354f2cba10058633e2936b0cc29fdc7978f4bb10418c5cdde9f6806a4574db079947fe138f5ea860aa1663ee8eba01b76f7ab3a21f5d52914f246eb5d49e6700db63d29d753b09bee649b480a26d18eea4ec2e4f67c4c087f0a80db7e4ad8a520e54428837cd5c696ea8962683386c7d0b8491b65deac0b046db2d07cbc8126d4323f8d5b601e5427adc7862c5c89e8e2754f57f12756565aca0b7761e0102ae7b5d52f2d031ef9cd10ea84a69c64", 0xcc}, {&(0x7f0000000280)="ae1cb1dfc41ce443a82272fe77dbc6765d73bfcb5cac3fe71016fa03dbe4f3dc437783fe2b76d57ef3485236beeb27f5b2347feab5eafe648bfe434c599c7b648a7eaf9af318ef0637d399dc1166855443514f18fa9f2bc4772afea8139b1dce9d", 0x61}], 0x2, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000001c0)) dup3(r1, r0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r4 = dup3(r3, r2, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[], 0xffffffffffffffc6) write$cgroup_subtree(r4, &(0x7f00000002c0)=ANY=[], 0xfe48) fsync(r2) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000000140)) 2018/04/27 15:26:36 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 2018/04/27 15:26:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa}, 0x1c) 2018/04/27 15:26:36 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000001040)={0x0, 0x592}, &(0x7f0000001080)=0x8) 2018/04/27 15:26:38 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:26:38 executing program 2: timer_create(0x0, &(0x7f0000000200)={0x0, 0x0, 0x1, @thr={&(0x7f0000000000), &(0x7f0000000100)}}, &(0x7f0000000240)) timer_gettime(0x0, &(0x7f0000000280)) 2018/04/27 15:26:38 executing program 4: r0 = socket(0x11, 0x4000000000080003, 0x0) pwrite64(r0, &(0x7f0000000000), 0x0, 0x0) 2018/04/27 15:26:38 executing program 5: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1563) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000005}) r2 = inotify_add_watch(r0, &(0x7f0000b0bff6)='./control\x00', 0x80) clock_gettime(0x0, &(0x7f0000000380)={0x0}) ppoll(&(0x7f0000000280)=[{r0, 0x1040}, {r1}], 0x2, &(0x7f00000003c0)={r3}, &(0x7f0000000400), 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000340), 0x8) inotify_rm_watch(r0, r2) 2018/04/27 15:26:38 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000dc0)=@assoc_value, &(0x7f0000000e40)=0x8) 2018/04/27 15:26:38 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x1c) 2018/04/27 15:26:38 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r1+10000000}}, &(0x7f0000046000)) timer_delete(0x0) 2018/04/27 15:26:38 executing program 0: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={&(0x7f00000011c0), &(0x7f00000000c0)}}, &(0x7f0000001280)) clock_gettime(0x0, &(0x7f00000012c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000001300)={{}, {0x0, r0+10000000}}, &(0x7f0000001340)) 2018/04/27 15:26:38 executing program 3: openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[], 0xffffffffffffffc6) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_subtree(r2, &(0x7f00000002c0)=ANY=[], 0xfe48) fsync(r0) 2018/04/27 15:26:38 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast1=0xe0000001, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/27 15:26:38 executing program 2: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={&(0x7f00000011c0), &(0x7f00000000c0)}}, &(0x7f0000001280)) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000001300)={{0x0, r0+30000000}, {0x77359400}}, &(0x7f0000001340)) timer_settime(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)) 2018/04/27 15:26:38 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) clock_gettime(0x0, &(0x7f0000002500)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002440)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/244, 0xf4}, {&(0x7f0000000280)=""/211, 0xd3}], 0x2, &(0x7f0000000380)=""/101, 0x65}}, {{&(0x7f0000000400)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000900)=""/4096, 0x1000}], 0x1, &(0x7f0000001900)=""/152, 0x98}}], 0x2, 0x2, &(0x7f0000002540)={0x0, r2+10000000}) recvmmsg(r0, &(0x7f0000000040), 0x948, 0x42, 0x0) 2018/04/27 15:26:38 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000344000)={0x0, 0x4, 0x4, @tid=r0}, &(0x7f0000cb2ffc)) rt_sigprocmask(0x0, &(0x7f0000479000)={0xfffffffffffffffe}, 0x0, 0x8) clock_gettime(0x0, &(0x7f000005b000)={0x0, 0x0}) timer_settime(0x0, 0xfffffffffffffffd, &(0x7f000005bfe0)={{}, {0x0, r1+10000000}}, &(0x7f0000046000)) timer_delete(0x0) 2018/04/27 15:26:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 2018/04/27 15:26:38 executing program 3: pkey_free(0xffffffffffffffff) 2018/04/27 15:26:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x2710}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/04/27 15:26:40 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) socket$inet(0x2, 0x4000000000000001, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000011c0)) 2018/04/27 15:26:40 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000013ff4)={@dev={0xac, 0x14}, @loopback=0x7f000001, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0xc) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/27 15:26:40 executing program 3: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x38a, 0x0) 2018/04/27 15:26:40 executing program 7: syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:40 executing program 1: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) vmsplice(r1, &(0x7f0000001480)=[{&(0x7f00000013c0)="8e", 0x1}], 0x1, 0x0) 2018/04/27 15:26:40 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0x0, r1) 2018/04/27 15:26:40 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x0, 0x400000) readlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/148, 0x94) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000080)={&(0x7f0000002100)=""/4096, 0x1000}) 2018/04/27 15:26:40 executing program 3: timer_create(0x7, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={&(0x7f00000011c0), &(0x7f00000000c0)}}, &(0x7f0000001280)) clock_gettime(0x0, &(0x7f00000012c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000001300)={{}, {0x0, r0+10000000}}, &(0x7f0000001340)) 2018/04/27 15:26:40 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000400)) getpgrp(0x0) waitid(0x0, 0x0, &(0x7f00000001c0), 0x4100000e, &(0x7f0000000200)) 2018/04/27 15:26:40 executing program 0: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r2}, &(0x7f00000000c0), 0x8) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 2018/04/27 15:26:40 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x2710}, 0x8) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 2018/04/27 15:26:40 executing program 4: linkat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x1000) 2018/04/27 15:26:40 executing program 7: syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:40 executing program 3: r0 = socket$inet6(0xa, 0x10000000002, 0x0) sendto$inet6(r0, &(0x7f000047f000), 0x9f, 0x8000, &(0x7f0000a2afe4)={0xa, 0x4e23, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000466000), 0x0, 0x0, &(0x7f00006e4fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/04/27 15:26:41 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6, 0x0, 0x2b}, 0x0, @in=@broadcast=0xffffffff}}, 0xe8) 2018/04/27 15:26:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) syncfs(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f00000000c0)) 2018/04/27 15:26:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000b9343a)={0x10}, 0xc, &(0x7f00005a1000)={&(0x7f0000000200)=@dellink={0x20, 0x11, 0xb1d}, 0x20}, 0x1}, 0x0) 2018/04/27 15:26:41 executing program 7: syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa}, @in6={0xa, 0x4e22, 0x5, @empty, 0x4}], 0x38) sendmsg$nfc_llcp(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x7, 0x10001, 0x1, "7115ba9ddf99f0dc7a0bc17e716cabede7c89a3204ee5363032bd05ec5cfe8ed7ab5cb1604e003af0a725e586245c92fd3e5657cb9e169c4ff4f9a53a956b6", 0x15}, 0x60, &(0x7f00000000c0), 0x0, &(0x7f0000000300)={0xb0, 0x10d, 0x81, "49e0d64cfce9302ecf9d713c2c5cfadb84df901843a7a258c38168c0be474c1fe52293901ca68b46712f439aded83f1bd1c6bc77e6130edbde4dd2fdfc2b5f5a16b12e5d241b1786a964da61dad4d5ed7f083a03f4e0657910c9546e24f5c22d1dd410c1d01f54010970917633c04c78e34ce607f475dae7bdca863dab521764d2632488591e4638ee09d307e923c99233a1e74c3d4591a849"}, 0xb0, 0x4000840}, 0x8094) pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) socket(0x10, 0x802, 0x0) 2018/04/27 15:26:41 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000400)) getpgrp(0x0) waitid(0x0, 0x0, &(0x7f00000001c0), 0x4100000e, &(0x7f0000000200)) 2018/04/27 15:26:41 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:41 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) socket$inet(0x2, 0x4000000000000001, 0x0) [ 110.690289] print_req_error: I/O error, dev loop0, sector 0 [ 110.696275] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 110.704186] print_req_error: I/O error, dev loop0, sector 8 [ 110.710119] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 110.717926] print_req_error: I/O error, dev loop0, sector 16 [ 110.723819] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 110.731640] print_req_error: I/O error, dev loop0, sector 24 2018/04/27 15:26:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0xfffffffffffffffe, 0x0, r1, &(0x7f0000000000)='./file0\x00') [ 110.737536] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 110.745331] print_req_error: I/O error, dev loop0, sector 32 [ 110.751222] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 110.759021] print_req_error: I/O error, dev loop0, sector 40 [ 110.764947] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 110.772736] print_req_error: I/O error, dev loop0, sector 48 [ 110.778623] Buffer I/O error on dev loop0, logical block 6, lost async page write 2018/04/27 15:26:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x1, 0x0, r1, &(0x7f0000000040)='./file0\x00') 2018/04/27 15:26:41 executing program 7: write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) [ 110.786472] print_req_error: I/O error, dev loop0, sector 56 [ 110.792372] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 110.800183] print_req_error: I/O error, dev loop0, sector 64 [ 110.806108] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 110.813903] print_req_error: I/O error, dev loop0, sector 72 [ 110.819862] Buffer I/O error on dev loop0, logical block 9, lost async page write 2018/04/27 15:26:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa}, @in6={0xa, 0x4e22, 0x5, @empty, 0x4}], 0x38) openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x2000c2, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x27, 0x1, 0x1, 0x7, 0x10001, 0x1, "7115ba9ddf99f0dc7a0bc17e716cabede7c89a3204ee5363032bd05ec5cfe8ed7ab5cb1604e003af0a725e586245c92fd3e5657cb9e169c4ff4f9a53a956b6", 0x15}, 0x60, &(0x7f00000000c0), 0x0, &(0x7f0000000300)={0xb0, 0x10d, 0x81, "49e0d64cfce9302ecf9d713c2c5cfadb84df901843a7a258c38168c0be474c1fe52293901ca68b46712f439aded83f1bd1c6bc77e6130edbde4dd2fdfc2b5f5a16b12e5d241b1786a964da61dad4d5ed7f083a03f4e0657910c9546e24f5c22d1dd410c1d01f54010970917633c04c78e34ce607f475dae7bdca863dab521764d2632488591e4638ee09d307e923c99233a1e74c3d4591a849"}, 0xb0, 0x4000840}, 0x8094) pread64(r0, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) socket(0x10, 0x802, 0x0) 2018/04/27 15:26:41 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:42 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:42 executing program 7: write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:42 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x2, 0xa18, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f0000000040), &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaa00ff000000000000aaaaaaaa00ff00000000000000009808000098080000c808000071756f746100000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000007533320000000000000000000000000000000000000000000000000000000000c007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff010000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ca750fc81100000000000000000000000000000000000000007000000070000000c00000006c6f67000000000000000000000000000000000000000000000000000000000028000000000000000019358fd7efa35ca2d7eb1767a4c43b69655391056303b97ef841b924cf71000000000000000000"]}, 0xa90) 2018/04/27 15:26:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) syncfs(r0) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f00000000c0)) 2018/04/27 15:26:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001500)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000002880)={0x14, 0x6, 0x1, 0x701}, 0x14}, 0x1}, 0x0) 2018/04/27 15:26:42 executing program 7: write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:43 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, &(0x7f0000664fc0)) readv(r0, &(0x7f0000000040)=[{&(0x7f00008a7112)=""/46, 0x2e}], 0x10000000000000bf) 2018/04/27 15:26:43 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:43 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:43 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:43 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:43 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) dup2(r0, r1) 2018/04/27 15:26:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 2018/04/27 15:26:43 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet(0xa, 0x2, 0x0) setns(r2, 0x8000000) 2018/04/27 15:26:43 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x400}) 2018/04/27 15:26:43 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:43 executing program 4: r0 = mq_open(&(0x7f0000000040)='-$\x00', 0x800, 0x0, &(0x7f0000000080)) unshare(0x20000400) mq_timedreceive(r0, &(0x7f0000000100)=""/131, 0x259, 0x0, 0x0) 2018/04/27 15:26:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$link(0x8, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000002fe4)={0xa}, 0x1c) write(r0, &(0x7f0000000300)="f006ec2d", 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 2018/04/27 15:26:43 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:43 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0xa, 0x2, 0x0) 2018/04/27 15:26:43 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1e, &(0x7f0000001080)=""/4096, &(0x7f0000000000)=0x1000) 2018/04/27 15:26:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000056c0)={@dev={0xfe, 0x80}, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x100000000}) 2018/04/27 15:26:44 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) dup2(r0, r1) 2018/04/27 15:26:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/27 15:26:44 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:44 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:44 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:44 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 2018/04/27 15:26:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) syz_emit_ethernet(0x1, &(0x7f0000982f5b)=ANY=[@ANYBLOB="0352ba8e82270180c2000000080045000000000000e00000010000000004019078002099e9005d0010000000000000000000"], &(0x7f00000e7fec)) 2018/04/27 15:26:44 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:44 executing program 5: r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) 2018/04/27 15:26:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/27 15:26:44 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:44 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@ipv4={[], [0xff, 0xff]}}, 0x14) 2018/04/27 15:26:44 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$netrom(r0, &(0x7f0000000400)={&(0x7f000029eff0)=@ax25={0x3, {"091c7b55e8647a"}}, 0x10, &(0x7f0000bcc000), 0x0, &(0x7f0000000040)}, 0x0) [ 113.591095] random: crng init done 2018/04/27 15:26:45 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:45 executing program 2: syz_emit_ethernet(0x1f8, &(0x7f00003f3fd5)={@link_local={0x1, 0x80, 0xc2}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=0xac1414aa, @multicast1=0xe0000001}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 2018/04/27 15:26:45 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}}}, 0x32) close(r0) 2018/04/27 15:26:45 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:45 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) dup2(r0, r1) 2018/04/27 15:26:45 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$netrom(r0, &(0x7f0000000400)={&(0x7f000029eff0)=@ax25={0x3, {"091c7b55e8647a"}}, 0x10, &(0x7f0000bcc000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/27 15:26:45 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:45 executing program 2: request_key(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)='/dev/snd/timer\x00', 0xfffffffffffffffe) 2018/04/27 15:26:45 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$netrom(r0, &(0x7f0000000400)={&(0x7f000029eff0)=@ax25={0x3, {"091c7b55e8647a"}}, 0x10, &(0x7f0000bcc000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/27 15:26:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}], 0x1, 0x0) 2018/04/27 15:26:45 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:45 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) writev(0xffffffffffffffff, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000d2effc)=0x81, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040), 0x8) 2018/04/27 15:26:45 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:46 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$netrom(r0, &(0x7f0000000400)={&(0x7f000029eff0)=@ax25={0x3, {"091c7b55e8647a"}}, 0x10, &(0x7f0000bcc000), 0x0, &(0x7f0000000040)}, 0x0) 2018/04/27 15:26:46 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}], 0x1, 0x0) 2018/04/27 15:26:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:46 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}], 0x1, 0x0) 2018/04/27 15:26:46 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) dup2(r0, r1) 2018/04/27 15:26:46 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:46 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}], 0x1, 0x0) 2018/04/27 15:26:46 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:46 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) dup2(r1, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) 2018/04/27 15:26:46 executing program 6: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000e00)=0x100000000000000, 0x4731e26b) r1 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r1, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:46 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:46 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80042407, &(0x7f00000001c0)) 2018/04/27 15:26:46 executing program 6: openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:46 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) 2018/04/27 15:26:46 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:46 executing program 4: write(0xffffffffffffffff, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) 2018/04/27 15:26:46 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}], 0x18) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) [ 115.691671] print_req_error: 512 callbacks suppressed [ 115.691691] print_req_error: I/O error, dev loop0, sector 1024 [ 115.703256] buffer_io_error: 508 callbacks suppressed [ 115.703277] Buffer I/O error on dev loop0, logical block 128, lost async page write [ 115.716494] print_req_error: I/O error, dev loop0, sector 1032 [ 115.722591] Buffer I/O error on dev loop0, logical block 129, lost async page write 2018/04/27 15:26:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000002000)}, 0x8000) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000040)="bc", 0x1}], 0x1, &(0x7f000000ae80)}, 0x0) 2018/04/27 15:26:47 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:47 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:47 executing program 3: pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) 2018/04/27 15:26:47 executing program 2: rt_sigaction(0x7, &(0x7f0000000000)={0xffffffffff7fff0f}, &(0x7f0000d4efe8), 0x8, &(0x7f0000312ff8)) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) 2018/04/27 15:26:47 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:47 executing program 4: r0 = socket(0x0, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) 2018/04/27 15:26:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = dup2(r1, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f0000000000)='E', 0x1, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) 2018/04/27 15:26:47 executing program 4: r0 = socket(0x400024000000010, 0x0, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) 2018/04/27 15:26:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:47 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x1, 0xfffffffffffffffd, r1, &(0x7f0000000040)='./file0\x00') 2018/04/27 15:26:47 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002000039", 0x1f) [ 116.701028] print_req_error: I/O error, dev loop0, sector 0 [ 116.707828] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 116.715648] print_req_error: I/O error, dev loop0, sector 8 [ 116.721481] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 116.729275] print_req_error: I/O error, dev loop0, sector 16 [ 116.735198] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 116.742979] print_req_error: I/O error, dev loop0, sector 24 [ 116.748876] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 116.756704] print_req_error: I/O error, dev loop0, sector 32 [ 116.762608] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 116.770389] print_req_error: I/O error, dev loop0, sector 40 [ 116.776286] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 116.784099] print_req_error: I/O error, dev loop0, sector 48 [ 116.789989] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 116.797755] print_req_error: I/O error, dev loop0, sector 56 [ 116.803643] Buffer I/O error on dev loop0, logical block 7, lost async page write 2018/04/27 15:26:47 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000), 0x0) 2018/04/27 15:26:47 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x5, 0x40000020, r1, &(0x7f0000000040)='./file0\x00') 2018/04/27 15:26:49 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:49 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000), 0x0) 2018/04/27 15:26:49 executing program 3: pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) 2018/04/27 15:26:49 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:49 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) 2018/04/27 15:26:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = dup2(r1, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f0000000000)='E', 0x1, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) 2018/04/27 15:26:49 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:49 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:49 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000), 0x0) 2018/04/27 15:26:49 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500), 0x0, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = dup2(r1, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f0000000000)='E', 0x1, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) 2018/04/27 15:26:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = dup2(r1, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f0000000000)='E', 0x1, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) 2018/04/27 15:26:49 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:49 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc020303", 0x10) 2018/04/27 15:26:49 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:49 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc020303", 0x10) 2018/04/27 15:26:49 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:50 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = dup2(r1, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r1, r1, &(0x7f0000000080), 0x102000004) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000788ffc)=0xfffffffd, 0x4) sendto$inet(r0, &(0x7f0000000000)='E', 0x1, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmmsg(r0, &(0x7f0000006b80)=[{{&(0x7f0000002f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x10, &(0x7f0000003180), 0x0, &(0x7f00000031c0)}}, {{&(0x7f0000003480)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x10, &(0x7f0000005780), 0x8d, &(0x7f0000005800)=[{0x10, 0x18d}], 0x10}}], 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) 2018/04/27 15:26:51 executing program 3: pipe2(&(0x7f0000989000), 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}}}, &(0x7f00000000c0)=0x98) 2018/04/27 15:26:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:51 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x102) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) mlock2(&(0x7f00002fd000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f00002ff000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 2018/04/27 15:26:51 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:51 executing program 5: r0 = perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000001280)=""/4096, 0x1000) 2018/04/27 15:26:51 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc020303", 0x10) 2018/04/27 15:26:51 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:51 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81", 0x18) 2018/04/27 15:26:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:51 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x0) writev(r0, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:51 executing program 1: r0 = socket(0x0, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:51 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x2001}) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r1, r0) 2018/04/27 15:26:51 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:51 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81", 0x18) 2018/04/27 15:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, "e91f7189591e9233614b00"}, 0x42) getitimer(0x1, &(0x7f0000000000)) 2018/04/27 15:26:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:53 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81", 0x18) 2018/04/27 15:26:53 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:53 executing program 1: r0 = socket(0x40000000015, 0x0, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x7}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000300)=0x4, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x100004e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/27 15:26:53 executing program 6: recvmmsg(0xffffffffffffffff, &(0x7f0000004500)=[{{&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/82, 0xfed3}], 0x0, &(0x7f00000005c0)=""/188, 0xbc}}], 0x1, 0x0, &(0x7f0000004400)={0x0, 0x1c9c380}) r0 = syz_open_dev$urandom(&(0x7f0000000d00)='/dev/urandom\x00', 0x0, 0x101601) writev(0xffffffffffffffff, &(0x7f0000000500), 0x1000000000000024) 2018/04/27 15:26:53 executing program 7: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ac}, 0x10) rt_sigtimedwait(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), 0x8) [ 122.120253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/27 15:26:53 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002", 0x1c) 2018/04/27 15:26:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:53 executing program 7: r0 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000002c0)='/', 0x1, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000400)=""/4096, 0x1000) 2018/04/27 15:26:53 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002", 0x1c) 2018/04/27 15:26:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x7}, 0x8) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000300)=0x4, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x100004e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r0) 2018/04/27 15:26:53 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) dup2(r0, r1) 2018/04/27 15:26:53 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 2018/04/27 15:26:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), 0x8) sysfs$1(0x1, &(0x7f00000003c0)='/dev/ppp\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000200)=0x98) [ 123.033114] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/04/27 15:26:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x50, 0xfffffffffffffffa) 2018/04/27 15:26:54 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002", 0x1c) 2018/04/27 15:26:54 executing program 7: getrandom(&(0x7f0000000480)=""/30, 0xffffffffffffff6d, 0x3) 2018/04/27 15:26:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000180)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'dh\x00'}, 0x2c) 2018/04/27 15:26:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) [ 123.243156] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:0 dh 2018/04/27 15:26:54 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) 2018/04/27 15:26:54 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81000000020000", 0x1e) 2018/04/27 15:26:54 executing program 7: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'none\x00'}, {@broadcast=0xffffffff, 0x0, 0x0, 0x0, 0x5}}, 0x44) 2018/04/27 15:26:54 executing program 5: keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x1}) 2018/04/27 15:26:54 executing program 2: r0 = gettid() r1 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f00000e5000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00009322c4)={0x2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvmmsg(r1, &(0x7f0000001940)=[{{&(0x7f00000001c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001340)=""/156, 0x9c}}, {{&(0x7f0000001400)=@hci, 0x80, &(0x7f00000015c0)}}], 0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000000000)=""/26, 0x1a) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000240)=0x2, 0x4) tkill(r0, 0x1000000000016) 2018/04/27 15:26:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:54 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) dup2(r0, r1) 2018/04/27 15:26:54 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) [ 123.936701] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:0 none 2018/04/27 15:26:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:55 executing program 2: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@broute={'broute\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, &(0x7f0000000000), &(0x7f0000000140)=[{0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 2018/04/27 15:26:55 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81000000020000", 0x1e) 2018/04/27 15:26:55 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 2018/04/27 15:26:55 executing program 7: prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) 2018/04/27 15:26:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) [ 124.156955] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.206777] kernel msg: ebtables bug: please report to author: Wrong len argument [ 124.265892] kernel msg: ebtables bug: please report to author: Wrong len argument 2018/04/27 15:26:55 executing program 4: r0 = socket(0x400024000000010, 0x2, 0x0) write(r0, &(0x7f0000000000)="1f00000056000d6dfcffff05bc0203030701ff2104173f81000000020000", 0x1e) 2018/04/27 15:26:55 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_netfilter(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x14}, 0x14}, 0x1}, 0x20008004) 2018/04/27 15:26:55 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) 2018/04/27 15:26:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/27 15:26:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$getown(r0, 0x9) 2018/04/27 15:26:55 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:55 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) dup2(r0, r1) 2018/04/27 15:26:55 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) [ 124.875385] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/27 15:26:55 executing program 4: r0 = socket(0x2, 0x803, 0xff) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 2018/04/27 15:26:55 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") fstat(r0, &(0x7f0000001dc0)) 2018/04/27 15:26:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:56 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00009ad000)=0x1) 2018/04/27 15:26:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000780)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in=@loopback=0x7f000001, @in=@remote={0xac, 0x14, 0x14, 0xbb}}}}, 0xb8}, 0x1}, 0x0) 2018/04/27 15:26:56 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) [ 125.125449] netlink: 104 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/27 15:26:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x2021ffd, &(0x7f0000000500)=ANY=[]) 2018/04/27 15:26:56 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) 2018/04/27 15:26:56 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f00009ad000)=0x1) 2018/04/27 15:26:56 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) [ 125.336656] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/27 15:26:56 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:56 executing program 4: mmap(&(0x7f0000000000/0xa08000)=nil, 0xa08000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @host=0x2}, 0x10) 2018/04/27 15:26:56 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) 2018/04/27 15:26:56 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f3ff0)={0x2}, 0x10) 2018/04/27 15:26:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:26:56 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:56 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x223, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}, @udp={0x0, 0x0, 0x8}}}}}, &(0x7f00000000c0)) 2018/04/27 15:26:56 executing program 7: msgrcv(0x0, &(0x7f0000000040)={0x0, ""/73}, 0x51, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='.'], 0x1, 0x0) 2018/04/27 15:26:56 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget(0x0, 0x210) msgctl$IPC_RMID(r0, 0x0) 2018/04/27 15:26:56 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x4, 0x9000000000000001, &(0x7f0000cc3ff0), &(0x7f000044b000), 0x0) 2018/04/27 15:26:56 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:56 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "56f8263b0ddb9b5a18daf279b519b19143902bb8007d600c9e8d4c218ddf2b4b49801bfd3b786bfd374bf94c43985a1dd4d83555313548936268ce551ea0b1"}, 0x58) 2018/04/27 15:26:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:26:57 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:57 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:26:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:26:57 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:57 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x4, 0xb, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/04/27 15:26:57 executing program 0: r0 = dup(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r0, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:57 executing program 6: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) 2018/04/27 15:26:57 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000180)='./file0\x00', 0x0) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:57 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:26:57 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:26:57 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:57 executing program 6: r0 = socket(0xa, 0x2, 0x0) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) 2018/04/27 15:26:58 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:58 executing program 0: r0 = dup(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r0, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:58 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:26:58 executing program 6: sendto$inet(0xffffffffffffffff, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) 2018/04/27 15:26:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:26:58 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:58 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:26:58 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0x4, 0x9000000000000001, &(0x7f0000cc3ff0), &(0x7f000044b000), 0x0) 2018/04/27 15:26:58 executing program 6: r0 = socket(0x0, 0x2, 0x0) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) [ 127.554235] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 127.563163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 127.578895] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.585427] bridge0: port 1(bridge_slave_0) entered forwarding state 2018/04/27 15:26:58 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_init1(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 127.664568] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/27 15:26:58 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) [ 127.720930] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.727446] bridge0: port 1(bridge_slave_0) entered forwarding state 2018/04/27 15:26:59 executing program 0: r0 = dup(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r0, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:26:59 executing program 6: r0 = socket(0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) 2018/04/27 15:26:59 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:26:59 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:26:59 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:26:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_init1(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:26:59 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:26:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x13, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)) timer_delete(0x0) [ 128.503487] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.562183] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.568718] bridge0: port 1(bridge_slave_0) entered forwarding state 2018/04/27 15:26:59 executing program 5: mkdir(&(0x7f000022d000)='./file0\x00', 0x8) chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x1002, 0x0) chdir(&(0x7f0000000240)='./file0\x00') umount2(&(0x7f0000e28000)='..', 0x2) symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000040)='../file0\x00') clock_gettime(0x0, &(0x7f0000003bc0)) open(&(0x7f0000000000)='../file0/file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x300}) 2018/04/27 15:27:00 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:00 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:00 executing program 6: r0 = socket(0xa, 0x2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) 2018/04/27 15:27:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_init1(0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:00 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:00 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:00 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:00 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000280)='./bus\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES64]) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=@random={'user.', "656d31706f7369785f61636c5f6163636573733aa700"}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) [ 129.413916] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.473562] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.480132] bridge0: port 1(bridge_slave_0) entered forwarding state 2018/04/27 15:27:00 executing program 6: r0 = socket(0xa, 0x2, 0x0) sendto$inet(r0, &(0x7f000038cf97), 0x0, 0x0, &(0x7f0000821ff0)={0x2}, 0x10) 2018/04/27 15:27:00 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) socket$inet_sctp(0x2, 0x800000000001, 0x84) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:00 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:00 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:00 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:00 executing program 6: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@broute={'%\nolte\x00', 0x20, 0x1, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x0, &(0x7f0000000340), &(0x7f0000000380)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 2018/04/27 15:27:00 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) listen(0xffffffffffffffff, 0x3ff) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) [ 129.855266] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.866320] kernel msg: ebtables bug: please report to author: bad policy 2018/04/27 15:27:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:00 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f0000000340)=ANY=[]) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000280)='./bus\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES64]) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=@random={'user.', "656d31706f7369785f61636c5f6163636573733aa700"}) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x15555555555555bf, &(0x7f00000002c0), 0x0, &(0x7f0000000780)=ANY=[]) [ 129.930936] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 129.943751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.970620] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.977145] bridge0: port 1(bridge_slave_0) entered forwarding state 2018/04/27 15:27:01 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:01 executing program 6: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 2018/04/27 15:27:01 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) listen(0xffffffffffffffff, 0x3ff) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:01 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:01 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:01 executing program 5: r0 = gettid() syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') exit(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000100)) 2018/04/27 15:27:01 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb", 0x31, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:01 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000000c) fcntl$notify(r0, 0x402, 0x10) dup2(r0, r1) 2018/04/27 15:27:01 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:01 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x80, 0x0) listen(0xffffffffffffffff, 0x3ff) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:01 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, 0xffffffffffffffff) 2018/04/27 15:27:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:01 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:01 executing program 6: perf_event_open(&(0x7f000001d000)={0x2200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000), 0x1}}, r0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000100)=""/91, 0x5b) 2018/04/27 15:27:02 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:02 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:02 executing program 2: mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:02 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, 0xffffffffffffffff) 2018/04/27 15:27:02 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0xed92, 0x5, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000040)}, 0x10) 2018/04/27 15:27:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x5, 0x100000000209e1f, 0x8000000001, 0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffffb, 0x0, 0x20000003, 0x0}, 0x2c) 2018/04/27 15:27:02 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:02 executing program 7: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:02 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x5, 0x100000000209e1f, 0x8000000001, 0x5}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xee}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x4, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffffb, 0x0, 0x20000003, 0x0}, 0x2c) 2018/04/27 15:27:02 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, 0xffffffffffffffff) 2018/04/27 15:27:02 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000340)={r0, &(0x7f0000000280), &(0x7f00000002c0)=""/101}, 0x18) 2018/04/27 15:27:02 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:02 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:02 executing program 7: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:02 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:02 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180), &(0x7f0000eee000)}, 0x20) 2018/04/27 15:27:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:03 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000700)=""/48, 0x30, 0x20, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:03 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:03 executing program 7: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:04 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='ecryptfs\x00', 0x1000021, 0x0) 2018/04/27 15:27:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x20000221) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:04 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) creat(&(0x7f0000ccb000)='./bus\x00', 0x0) open(&(0x7f0000043000)='./bus\x00', 0x0, 0x0) open(&(0x7f0000272ffa)='./bus\x00', 0x2, 0x0) 2018/04/27 15:27:04 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback=0x7f000001}, 0x10) recvfrom$inet(r0, &(0x7f0000000700)=""/48, 0x30, 0x0, &(0x7f0000000740)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x705000) 2018/04/27 15:27:04 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:04 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:04 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:04 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:05 executing program 6: r0 = socket(0x1e, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) r1 = socket(0x1e, 0x2, 0x0) sendmsg(r1, &(0x7f0000f36fc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02010000000020df0000000000000000805bf86c57020002000000f1fffff400000000000000000000010300000000e4ff064b3fdf3a000000080000000000000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ece000206000000090000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000001380), 0x0, &(0x7f0000d19000)}, 0x0) 2018/04/27 15:27:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:05 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0xc0045878, &(0x7f0000000000)) 2018/04/27 15:27:05 executing program 7: r0 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:05 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:05 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:05 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x400000ab}, 0x77) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000000)) 2018/04/27 15:27:05 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:05 executing program 6: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x47}, 0xfffffffffffffca2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet(0x4, 0xc, 0x6f2000, &(0x7f0000000d00)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x2e1bd6df) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f00000000c0)}, 0x10) 2018/04/27 15:27:05 executing program 1: r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000140), 0xce4) 2018/04/27 15:27:05 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:05 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) 2018/04/27 15:27:06 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:06 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:06 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000ffa)='./bus\x00', 0x1000, 0x0) pipe(&(0x7f0000035ff8)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000ccb000)='./bus\x00', 0x0) r1 = open(&(0x7f0000043000)='./bus\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 2018/04/27 15:27:06 executing program 5: r0 = memfd_create(&(0x7f0000000140)="70726f63ae6d696d655f74797065776c616e316e6f64657600", 0x7) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstatfs(r0, &(0x7f0000000040)=""/181) 2018/04/27 15:27:06 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, &(0x7f0000cde000)) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 2018/04/27 15:27:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ipv6_route\x00') r1 = memfd_create(&(0x7f0000000040)='\x00', 0x0) sendfile(r1, r0, &(0x7f0000000200), 0x200000010000) 2018/04/27 15:27:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(0xffffffffffffffff, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) read(r1, &(0x7f00000001c0)=""/35, 0x23) 2018/04/27 15:27:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(0xffffffffffffffff, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:06 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f0000791000)={0x10}, 0xc, &(0x7f0000dd0ff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000130a01000000000000000000000000000c0002006f3bb47f"], 0x1c}, 0x1}, 0x0) 2018/04/27 15:27:06 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) 2018/04/27 15:27:06 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a09c00082f00fe8000000000000000001f00000000bbfe8000000000000000000000000000aaa8c6e20000089078"], &(0x7f0000000040)) 2018/04/27 15:27:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(0xffffffffffffffff, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:07 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:07 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00', 0xc0ffffff}) 2018/04/27 15:27:07 executing program 2: clock_adjtime(0x0, &(0x7f0000000100)) 2018/04/27 15:27:07 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, &(0x7f0000588fff), 0xfffffffffffffe98, 0x20020003, &(0x7f0000385ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) shutdown(r3, 0x0) 2018/04/27 15:27:07 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:07 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0, 0x2000000008972, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10000a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 2018/04/27 15:27:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) read(r1, &(0x7f00000001c0)=""/35, 0x23) [ 136.134263] bridge0: port 1(bridge_slave_0) entered disabled state 2018/04/27 15:27:07 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 2018/04/27 15:27:07 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:07 executing program 2: pipe(&(0x7f0000000400)={0x0, 0x0}) fcntl$setpipe(r0, 0x407, 0xdb45aa1) 2018/04/27 15:27:07 executing program 5: r0 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ioctl$fiemap(r0, 0x40086602, &(0x7f0000000500)=ANY=[@ANYRES32=r0]) fallocate(r0, 0x0, 0x0, 0xf5) 2018/04/27 15:27:07 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:07 executing program 1: syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0) quotactl(0x0, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000001c0)) 2018/04/27 15:27:07 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 2018/04/27 15:27:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYBLOB="000002070a000200aaaa02aabaaa0000"], 0x2}, 0x1}, 0x0) 2018/04/27 15:27:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, &(0x7f0000ae2fff)) 2018/04/27 15:27:08 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x0, &(0x7f0000f07000)}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:08 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x4}, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000911000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) syz_open_dev$sndmidi(&(0x7f0000000200)='/dev/snd/midiC#D#\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/100, 0x27) 2018/04/27 15:27:08 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000bd4aed)={@random="cd5c0b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff}, [], {@ipv6={0x86dd, {0x0, 0x6, "ff0703", 0x30, 0x33, 0x0, @ipv4={[], [0xff, 0xff]}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "09aea5", 0x0, 0x0, 0x0, @dev={0xfe, 0x80}, @dev={0xfe, 0x80}}}}}}}}, 0x0) 2018/04/27 15:27:08 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000005c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000009c0)={'bridge_slave_0\x00'}) 2018/04/27 15:27:08 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:08 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00002c3000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000002c0)) 2018/04/27 15:27:08 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:08 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) open(&(0x7f0000000240)='./file0/0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8924, &(0x7f00000000c0)={'bond0\x00', r1}) 2018/04/27 15:27:09 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x0, &(0x7f0000f07000)}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:09 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00009fc000), 0x5fa, 0x0, &(0x7f0000357000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:27:09 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0xffffffffffffff1b, 0x20000011, &(0x7f0000000140)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/04/27 15:27:09 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(0xffffffffffffffff, r0) [ 138.462119] netlink: 48 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/27 15:27:09 executing program 7: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@nl=@proc={0x10}, 0x80, &(0x7f0000000200)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500060003000149bd50ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) 2018/04/27 15:27:09 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:09 executing program 6: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x101002) write$evdev(r0, &(0x7f0000037fe8)=[{{0x0, 0x7530}, 0x200001, 0x63, 0x2}, {{0x0, 0x2}}], 0x30) 2018/04/27 15:27:09 executing program 2: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000004c0), 0x0) mmap(&(0x7f0000f1f000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) memfd_create(&(0x7f0000000140)='keyring\x00', 0x1) ppoll(&(0x7f0000000180)=[{r0}, {}], 0x2, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={0x60cc}, 0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f1f000/0x3000)=nil, 0x3000, 0x0, 0x400000000008011, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) mmap(&(0x7f0000f1e000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000008c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 2018/04/27 15:27:09 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x0, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000040)=""/30, &(0x7f0000000000)=0x1e) [ 138.695715] netlink: 'syz-executor7': attribute type 6 has an invalid length. [ 138.783144] netlink: 48 bytes leftover after parsing attributes in process `syz-executor4'. 2018/04/27 15:27:09 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:09 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000033ff3)="0100000076626f786e65743100", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0x40a85321, &(0x7f00006e7f50)={{0x80}, 'port0\x00'}) 2018/04/27 15:27:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/27 15:27:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e000000000000", 0x48}], 0x1) 2018/04/27 15:27:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/27 15:27:10 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000180)=ANY=[]) open(&(0x7f0000000240)='./file0/|ile0\x00', 0x3fdfa, 0x0) 2018/04/27 15:27:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x0, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:10 executing program 5: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000244000)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:10 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000d40)={&(0x7f0000000a40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000009c0)=""/18, 0x12}], 0x1, &(0x7f0000000cc0)=""/97, 0x61}, 0x0) 2018/04/27 15:27:10 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000d53fc1)={@link_local={0x1, 0x80, 0xc2}, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x67, 0x0, @rand_addr, @broadcast=0xffffffff}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast1=0xe0000001}}}}}}, &(0x7f0000ea3000)) 2018/04/27 15:27:10 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(0xffffffffffffffff, r0) 2018/04/27 15:27:10 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x0, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:10 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000280)=0x2) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x0, r0}) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r1, r2) r3 = gettid() tkill(r3, 0x16) r4 = socket$netlink(0x10, 0x3, 0x80000000004) write(r4, &(0x7f000058bfe4)="29000000140003b7ff000000040860eb0017100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 2018/04/27 15:27:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400), 0x0) 2018/04/27 15:27:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/04/27 15:27:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400), 0x0) 2018/04/27 15:27:11 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:11 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x2) ioctl$TIOCGSOFTCAR(r1, 0x5412, &(0x7f0000000040)) 2018/04/27 15:27:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400), 0x0) 2018/04/27 15:27:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000400), 0x0, 0x20000004, &(0x7f00000003c0)={0xa}, 0x14) 2018/04/27 15:27:11 executing program 7: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000280)=0x2) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000704000)={0x0, r0}) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r1, r2) r3 = gettid() tkill(r3, 0x16) r4 = socket$netlink(0x10, 0x3, 0x80000000004) write(r4, &(0x7f000058bfe4)="29000000120003b7ff000000040860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 2018/04/27 15:27:11 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:11 executing program 3: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(0xffffffffffffffff, r0) 2018/04/27 15:27:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)}], 0x1) 2018/04/27 15:27:12 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:12 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:12 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=""/28}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), &(0x7f0000000140)=""/72}, 0x18) 2018/04/27 15:27:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:12 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000080)='/dev/rfkill\x00', 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f00004e5fff), &(0x7f00003a3fff)="16"}, 0x20) 2018/04/27 15:27:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)}], 0x1) 2018/04/27 15:27:12 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000180)={0x3, 0x7fff}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xb, 0x43, 0x4, 0x100000002, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000180), &(0x7f0000eee000)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/84}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0}, 0x10) 2018/04/27 15:27:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:12 executing program 7: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)}], 0x1) 2018/04/27 15:27:12 executing program 2: madvise(&(0x7f0000a47000/0x2000)=nil, 0x2000, 0xc) 2018/04/27 15:27:12 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:12 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 2018/04/27 15:27:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca", 0x24}], 0x1) 2018/04/27 15:27:13 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000500)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffff}, 0x13f}}, 0x20) write$rdma_cm(r0, &(0x7f0000000540)=@resolve_ip={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, {0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, r1}}, 0x48) 2018/04/27 15:27:13 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:13 executing program 7: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:13 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:13 executing program 1: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0xfeda) listen(r0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0), 0x0, &(0x7f00006e9c68)}, 0x0) r1 = accept$ipx(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000780)={{0x3, 0x0, r2, 0x0, 0x0, 0x8c, 0x4}, 0x0, 0x2, 0x7, 0x3}) 2018/04/27 15:27:13 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) 2018/04/27 15:27:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca", 0x24}], 0x1) 2018/04/27 15:27:13 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:13 executing program 7: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:14 executing program 2: socket(0x1e, 0x2, 0x0) io_setup(0x8001, &(0x7f00000004c0)=0x0) io_submit(r0, 0x0, &(0x7f0000000040)) 2018/04/27 15:27:14 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:14 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca", 0x24}], 0x1) 2018/04/27 15:27:14 executing program 5: clone(0x200, &(0x7f0000151000), &(0x7f0000000080), &(0x7f0000f8b000), &(0x7f0000000100)) mknod(&(0x7f0000000140)='./file0\x00', 0x2001001, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000240), &(0x7f0000000140)) io_setup(0xff, &(0x7f0000000000)=0x0) io_destroy(r0) io_submit(r0, 0x0, &(0x7f0000000680)) 2018/04/27 15:27:14 executing program 7: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x0) open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:14 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) 2018/04/27 15:27:14 executing program 7: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='../file0\x00') open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff000000", 0x36}], 0x1) 2018/04/27 15:27:14 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:15 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:15 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:15 executing program 7: open$dir(&(0x7f00000003c0)='../file0\x00', 0x0, 0x0) 2018/04/27 15:27:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff000000", 0x36}], 0x1) 2018/04/27 15:27:15 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = dup3(r1, r0, 0x0) pwritev(r1, &(0x7f0000000700)=[{&(0x7f0000000600)="02", 0x1}], 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES16, @ANYPTR, @ANYRES16], 0x10e00) 2018/04/27 15:27:15 executing program 5: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0xfeda) listen(r0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000005000), 0x0, &(0x7f0000000040)}, 0x0) accept$ipx(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 2018/04/27 15:27:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)={0x32, 0x594a450a}) 2018/04/27 15:27:15 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff000000", 0x36}], 0x1) 2018/04/27 15:27:15 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000040)=0x1bffffff, 0x5) 2018/04/27 15:27:15 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(blowfish))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab2719", 0x4) recvmsg(r1, &(0x7f0000158000)={&(0x7f0000000180)=@nfc_llcp, 0x253, &(0x7f0000000000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 2018/04/27 15:27:15 executing program 5: ioprio_set$pid(0x2, 0x0, 0x4001) clone(0x0, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) 2018/04/27 15:27:15 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:15 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f0000830000)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/27 15:27:15 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7", 0x3f}], 0x1) 2018/04/27 15:27:16 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:16 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') preadv(r0, &(0x7f0000b24fb0)=[{&(0x7f0000830000)=""/4096, 0x1000}], 0x1, 0x0) 2018/04/27 15:27:16 executing program 3: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./control/file0\x00') dup2(r0, r1) 2018/04/27 15:27:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7", 0x3f}], 0x1) 2018/04/27 15:27:16 executing program 2: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"410f44be5f55ea719cbb6635"}}], 0x30) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./file2\x00') dup2(r0, r1) 2018/04/27 15:27:16 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xffffffffffffffac, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0xffffffffffffff69}], 0x1, &(0x7f0000000000)=""/105, 0x69}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x0) close(r0) 2018/04/27 15:27:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_pid(r0, &(0x7f0000000000)=ANY=[], 0xffffffe7) fallocate(r0, 0x3, 0x0, 0x3000000004) 2018/04/27 15:27:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7", 0x3f}], 0x1) 2018/04/27 15:27:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:16 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001e00150500000000ff03000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}, 0x1}, 0x0) 2018/04/27 15:27:16 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)="7663616e30000100000800", 0x10) sendto$inet(r0, &(0x7f00000002c0), 0x99, 0x800000020000000, &(0x7f0000000140)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x800000000000852b, 0xffff}, 0x14) writev(r0, &(0x7f0000000080)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1) 2018/04/27 15:27:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e0000", 0x44}], 0x1) 2018/04/27 15:27:16 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xe2) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f0000000200)=ANY=[@ANYBLOB="f4"], 0x1}, 0x1}, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$unix(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000180)=[{&(0x7f00000000c0)="15", 0x1}], 0x1}, 0x0) 2018/04/27 15:27:16 executing program 1: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f00000affc0), &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f000066dff0)=[{&(0x7f00008ad000)=""/178, 0xfffffe0e}], 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/169, 0xa9) readv(r0, &(0x7f0000000600), 0x0) execveat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', &(0x7f00000007c0), &(0x7f0000000a00), 0x0) open$dir(&(0x7f00003e8ff8)='./file0\x00', 0x26102, 0x0) 2018/04/27 15:27:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) listen(r0, 0x3ff) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000400)=[{&(0x7f0000b8cfb7)="480000001400190d09004beafd0d8c560a847f0080ffe006000000ffffffffa2bc5603ca00000fff89000000200000000001ff0000000309ff5bff9dff00c7e5ed5e0000", 0x44}], 0x1) [ 146.794196] ================================================================== [ 146.801610] BUG: KMSAN: uninit-value in kallsyms_lookup+0x152/0x910 [ 146.808006] CPU: 1 PID: 9579 Comm: syz-executor1 Not tainted 4.16.0+ #87 [ 146.814837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.824178] Call Trace: [ 146.826776] dump_stack+0x185/0x1d0 [ 146.830397] ? kallsyms_lookup+0x152/0x910 [ 146.834613] kmsan_report+0x142/0x240 [ 146.838665] ? futex_wait_queue_me+0x475/0x710 [ 146.843235] __msan_warning_32+0x6c/0xb0 [ 146.847283] ? futex_wait_queue_me+0x475/0x710 [ 146.851860] kallsyms_lookup+0x152/0x910 [ 146.855919] ? __msan_poison_alloca+0x15c/0x1d0 [ 146.860593] ? futex_wait_queue_me+0x476/0x710 [ 146.865176] __sprint_symbol+0x147/0x5b0 [ 146.869234] ? kmsan_set_origin_inline+0x6b/0x120 [ 146.874071] ? futex_wait_queue_me+0x476/0x710 [ 146.878645] sprint_backtrace+0x7f/0x90 [ 146.882604] ? futex_wait_queue_me+0x476/0x710 [ 146.887189] symbol_string+0x19f/0x230 [ 146.891065] ? futex_wait_queue_me+0x476/0x710 [ 146.895647] ? kmsan_set_origin_inline+0x6b/0x120 [ 146.900513] ? __msan_poison_alloca+0x15c/0x1d0 [ 146.905176] ? vsnprintf+0xa2d/0x33c0 [ 146.908964] ? pointer+0xa8/0x1410 [ 146.912491] ? vsnprintf+0xa2d/0x33c0 [ 146.916281] ? futex_wait_queue_me+0x476/0x710 [ 146.920849] pointer+0xdb9/0x1410 [ 146.924294] ? futex_wait_queue_me+0x476/0x710 [ 146.928860] vsnprintf+0xa2d/0x33c0 [ 146.932477] seq_printf+0x29f/0x420 [ 146.936102] ? save_stack_trace_tsk+0x26a/0x2f0 [ 146.940757] ? futex_wait_queue_me+0x476/0x710 [ 146.945324] ? futex_wait_queue_me+0x476/0x710 [ 146.949892] ? futex_wait_queue_me+0x476/0x710 [ 146.954460] proc_pid_stack+0x326/0x470 [ 146.958423] proc_single_show+0x1af/0x300 [ 146.962559] ? proc_pid_wchan+0x250/0x250 [ 146.966694] ? proc_single_open+0x90/0x90 [ 146.970832] seq_read+0xc7d/0x2260 [ 146.974541] do_iter_read+0x880/0xd70 [ 146.978333] ? seq_open+0x360/0x360 [ 146.981942] do_readv+0x295/0x5f0 [ 146.985384] ? syscall_return_slowpath+0xe9/0x700 [ 146.990215] SYSC_readv+0x9b/0xb0 [ 146.993655] SyS_readv+0x56/0x80 [ 146.997003] do_syscall_64+0x309/0x430 [ 147.000883] ? vfs_readv+0x260/0x260 [ 147.004584] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.009754] RIP: 0033:0x455979 [ 147.012932] RSP: 002b:00007ffb80ecec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 147.020633] RAX: ffffffffffffffda RBX: 00007ffb80ecf6d4 RCX: 0000000000455979 [ 147.027883] RDX: 0000000000000001 RSI: 000000002066dff0 RDI: 0000000000000013 [ 147.035137] RBP: 000000000072bf50 R08: 0000000000000000 R09: 0000000000000000 [ 147.042390] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 147.049641] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000001 [ 147.056894] [ 147.058502] Uninit was stored to memory at: [ 147.062808] kmsan_internal_chain_origin+0x12b/0x210 [ 147.067893] __msan_chain_origin+0x69/0xc0 [ 147.072198] __save_stack_trace+0x829/0xb00 [ 147.076501] save_stack_trace_tsk+0x258/0x2f0 [ 147.080979] proc_pid_stack+0x26a/0x470 [ 147.084937] proc_single_show+0x1af/0x300 [ 147.089066] seq_read+0xc7d/0x2260 [ 147.092595] do_iter_read+0x880/0xd70 [ 147.096373] do_readv+0x295/0x5f0 [ 147.099817] SYSC_readv+0x9b/0xb0 [ 147.103252] SyS_readv+0x56/0x80 [ 147.106601] do_syscall_64+0x309/0x430 [ 147.110470] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.115723] Uninit was stored to memory at: [ 147.120030] kmsan_internal_chain_origin+0x12b/0x210 [ 147.125119] __msan_chain_origin+0x69/0xc0 [ 147.129340] update_stack_state+0x959/0xa40 [ 147.133659] unwind_next_frame+0x618/0xe50 [ 147.137878] __save_stack_trace+0x734/0xb00 [ 147.142187] save_stack_trace_tsk+0x258/0x2f0 [ 147.146676] proc_pid_stack+0x26a/0x470 [ 147.150633] proc_single_show+0x1af/0x300 [ 147.154766] seq_read+0xc7d/0x2260 [ 147.158291] do_iter_read+0x880/0xd70 [ 147.162074] do_readv+0x295/0x5f0 [ 147.165509] SYSC_readv+0x9b/0xb0 [ 147.168948] SyS_readv+0x56/0x80 [ 147.172306] do_syscall_64+0x309/0x430 [ 147.176176] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.181342] Local variable description: ----c.i.i.i.i.i@mem_cgroup_iter [ 147.188069] Variable was created at: [ 147.191770] mem_cgroup_iter+0xc3/0x1590 [ 147.195829] shrink_node+0x78f/0x1670 [ 147.199612] ================================================================== [ 147.206948] Disabling lock debugging due to kernel taint [ 147.212378] Kernel panic - not syncing: panic_on_warn set ... [ 147.212378] [ 147.219724] CPU: 1 PID: 9579 Comm: syz-executor1 Tainted: G B 4.16.0+ #87 [ 147.227844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.237192] Call Trace: [ 147.239783] dump_stack+0x185/0x1d0 [ 147.243397] panic+0x39d/0x940 [ 147.246593] ? kallsyms_lookup+0x152/0x910 [ 147.250816] kmsan_report+0x238/0x240 [ 147.254608] ? futex_wait_queue_me+0x475/0x710 [ 147.259171] __msan_warning_32+0x6c/0xb0 [ 147.263225] ? futex_wait_queue_me+0x475/0x710 [ 147.267792] kallsyms_lookup+0x152/0x910 [ 147.271834] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.276493] ? futex_wait_queue_me+0x476/0x710 [ 147.281061] __sprint_symbol+0x147/0x5b0 [ 147.285123] ? kmsan_set_origin_inline+0x6b/0x120 [ 147.289951] ? futex_wait_queue_me+0x476/0x710 [ 147.294520] sprint_backtrace+0x7f/0x90 [ 147.298478] ? futex_wait_queue_me+0x476/0x710 [ 147.303046] symbol_string+0x19f/0x230 [ 147.306920] ? futex_wait_queue_me+0x476/0x710 [ 147.311487] ? kmsan_set_origin_inline+0x6b/0x120 [ 147.316314] ? __msan_poison_alloca+0x15c/0x1d0 [ 147.320965] ? vsnprintf+0xa2d/0x33c0 [ 147.324747] ? pointer+0xa8/0x1410 [ 147.328268] ? vsnprintf+0xa2d/0x33c0 [ 147.332056] ? futex_wait_queue_me+0x476/0x710 [ 147.336630] pointer+0xdb9/0x1410 [ 147.340071] ? futex_wait_queue_me+0x476/0x710 [ 147.344653] vsnprintf+0xa2d/0x33c0 [ 147.348268] seq_printf+0x29f/0x420 [ 147.351902] ? save_stack_trace_tsk+0x26a/0x2f0 [ 147.356644] ? futex_wait_queue_me+0x476/0x710 [ 147.361215] ? futex_wait_queue_me+0x476/0x710 [ 147.366834] ? futex_wait_queue_me+0x476/0x710 [ 147.371404] proc_pid_stack+0x326/0x470 [ 147.375366] proc_single_show+0x1af/0x300 [ 147.379504] ? proc_pid_wchan+0x250/0x250 [ 147.383635] ? proc_single_open+0x90/0x90 [ 147.387765] seq_read+0xc7d/0x2260 [ 147.391298] do_iter_read+0x880/0xd70 [ 147.395086] ? seq_open+0x360/0x360 [ 147.398694] do_readv+0x295/0x5f0 [ 147.402136] ? syscall_return_slowpath+0xe9/0x700 [ 147.406966] SYSC_readv+0x9b/0xb0 [ 147.410408] SyS_readv+0x56/0x80 [ 147.413757] do_syscall_64+0x309/0x430 [ 147.417639] ? vfs_readv+0x260/0x260 [ 147.421337] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.426602] RIP: 0033:0x455979 [ 147.429785] RSP: 002b:00007ffb80ecec68 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 147.437476] RAX: ffffffffffffffda RBX: 00007ffb80ecf6d4 RCX: 0000000000455979 [ 147.444727] RDX: 0000000000000001 RSI: 000000002066dff0 RDI: 0000000000000013 [ 147.451987] RBP: 000000000072bf50 R08: 0000000000000000 R09: 0000000000000000 [ 147.459250] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 147.466508] R13: 0000000000000495 R14: 00000000006f9e98 R15: 0000000000000001 [ 147.474303] Dumping ftrace buffer: [ 147.477820] (ftrace buffer empty) [ 147.481506] Kernel Offset: disabled [ 147.485115] Rebooting in 86400 seconds..