ffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
r6 = gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4")
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r7 = syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, &(0x7f0000aa5000)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x2}, 0x1, 0x0, "69643000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "74696d6572310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x0, 0x80000000, 0x1, 0x3a, 0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
chdir(&(0x7f0000f51000)="2e2f66696c653000")
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:52 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
bind(r0, &(0x7f0000503000-0x3)=@nfc={0x27, 0x80000001, 0x1ff, 0x2}, 0x10)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000a6a000-0x4)=0xb414, 0x4)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:52 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"})
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
kexec_load(0x3dd, 0x3, &(0x7f0000477000)=[{&(0x7f0000b90000-0x80)="870a09a08ea07ac1849c92a8afa308e8dc3cd95afee668f7a0796be82d82211dc273eb0fe5858c34588f8b56d341122a5b4b567f9bf3db4a1910331bca0acfa21ec531b745efc1e5b1edf12219b558bde9d5e92ac5994f5a877fad7bf43064f7aaf80b973c133afddbc44429a7ead3f8776f103f432bc4733e380e0e49611e76", 0x80, 0x80, 0x200}, {&(0x7f0000705000)="9747eee6b93d022a1ac7e8706c0403e9a7f280c75f63f20195d9648c125c36c2596e7cd0dae4b00f7653e4b7f0b9526f801c26dc872c218552477a66b0f900fe77a05e5a54902bcca6a42702840063064fc541015d19bea6aefa6e27efb7895157d751c6b7d8cb2487d7bee73c1edb4ca9f3922e29ec94ae64d6721038ebed251dca8eb137a15ea376047ff117192da6de0db535734b2e3377e7ea25d6985916967775479a", 0xa5, 0xd08, 0x5}, {&(0x7f00008d0000)="3ee28a375ddbeaae39d9f91a1fe2b70b6fea18d416a8a4e1351a9885c62d0d640164cb69b0ab9de8c8b1afba58d118d4c7500b16b047f1a744f4482e939d080ec20e9fd4988f8318aff66d1382aec1a057fe97e3dd3222e602f8b40bb6bb03c145e967f172cd44be5325151b7228e7f54ce5e0b3ff4d7d1515090797163f49f392943bb8f63f17c43e06d6cf82d881082b8f44d4e2203426913303499702be9427af42413b315e2ab6961b0ad3772e9a6e10354faa6d3068bc9aabb8922b4306c4decb86e3cc59780941d2ee83c193dfc0b30294371f8542d7fc67450ca51632d8a2e711bd1b9e", 0xe7, 0x1, 0x1f}], 0x30002)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000d66000-0x4)=0xe8)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(r0, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000501000-0x30)={0x5, [0x4, 0xffff, 0x2, 0x0, 0x7cac]})
gettid()
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
dup(r2)
2017/12/06 19:31:52 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000444000-0x10)={0x0, 0x0, @rand_addr=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000153000)=0x10, 0x80800)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000a34000-0x4)=0x3, 0x4)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
r6 = gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4")
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r7 = syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82)
ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, &(0x7f0000aa5000)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x2}, 0x1, 0x0, "69643000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "74696d6572310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x0, 0x80000000, 0x1, 0x3a, 0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:52 executing program 5:
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x5, 0x2, 0x4000000000, 0x0, 0x40, 0x0, 0x0, 0x2, 0x0, 0x1000000000002, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
set_robust_list(&(0x7f0000aba000-0xc)={&(0x7f0000cc4000/0x1000)=nil, 0x3, &(0x7f0000c67000/0x3000)=nil}, 0xc)
socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00003cd000)={0x0, 0x0})
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwrite64(r0, &(0x7f0000254000)="e4d1112a0a5aea21758c841947da4203bd31caa34a02585e8e322e0b8a60b1c48209910c6735c48bbd5236ca4b387dbcfc9752ca0929ab9e632ea03e0d8a9bd7918c6fa50eb336808d9f7ff31935620527b7d4541f6b9bbd13cb79c1ef155f49c000", 0x62, 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x11, 0x400000000d, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714001000000000000009d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x1, 0x40000]})
2017/12/06 19:31:52 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r2, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:52 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"})
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:52 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000d39000-0x4)=0x0, 0x4)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
fcntl$setlease(r0, 0x400, 0x2)
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
r6 = gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4")
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:52 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f00004e5000-0x8)="2e2f66696c653000", 0x203e, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:52 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
setuid(r1)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
socket$kcm(0x29, 0x2, 0x0)
gettid()
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:52 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:52 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:52 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
openat$ptmx(0xffffffffffffff9c, &(0x7f00004e7000)="2f6465762f70746d7800", 0x181a00, 0x0)
openat(r0, &(0x7f000085c000)="2e2f66696c653000", 0x80000, 0x14)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
connect$netlink(r0, &(0x7f00009ba000)={0x2, 0x0, 0x1, 0x7ff}, 0xc)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setlease(r0, 0x400, 0x2)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x5, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
rmdir(&(0x7f0000f1a000-0x8)="2e2f66696c653000")
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
r6 = gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4")
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f000093b000-0x16)="656d30e45e7d2d5d6d643573756d70707031656d3100", 0x0)
r0 = open(&(0x7f0000854000-0x8)="2e2f66696c653000", 0x202, 0x3)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000816000)=0x0, &(0x7f0000e98000-0x4)=0x4)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f000015b000)=[], 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x10040, 0x3, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
ioctl$TIOCSTI(r0, 0x5412, 0x2)
sched_yield()
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000bc9000-0x4)=0x0, &(0x7f0000430000)=0x4)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000be7000)={0x5, 0xeb0e, 0x8000, 0x4})
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
mlockall(0x1)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000457000)={0x0, <r3=>0x0})
getpriority(0x1, r3)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
r6 = gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4")
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="69645f6c656761637900", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="00", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000c4f000)="68696768737065656400", 0xa)
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
syz_open_dev$vcsn(&(0x7f0000484000-0xa)="2f6465762f7663732300", 0xb3, 0x400)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f0000e82000)=[{&(0x7f000070b000)="c2b8", 0x2}, {&(0x7f000059c000-0x20)="304c6451c0432edf2d9ab5d85670df1468f28a13edcc53c843ba621e7acda747616c4cff99938a97b5f5bc6ba2bbc1dc0413d26e00e62f6dced0abf12cb3b4c2312f6dcb423e122956ad3ea92fe71edfba5876f4e4d898a4", 0x58}, {&(0x7f0000d82000-0x79)="6382e613600d2b07f73af0980a76fcb4c5847747eb488c4eafc1a872315113e6b7ebdf42a445ae1c61b3afcc124213be0cd314d831ab741ff6dc0ae517959f919df7cd838db6850c82f69de3c7cab65610a2514e1f979e5dd009a8082d35d87e5dcea7d013e89373d421f4084ecb898637acd9d6d2de64f3af", 0x79}], 0x3, 0xc9)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
epoll_create(0x5)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
renameat2(r0, &(0x7f0000a86000)="2e2f66696c653000", r0, &(0x7f0000f44000)="2e2f66696c653000", 0x2)
uselib(&(0x7f00001b7000)="2e2f66696c653000")
gettid()
ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00009ba000)={0x7, 0x7, 0x81})
ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000a1000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
gettid()
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x15, 0x6, 0x2, &(0x7f0000141000)={<r0=>0x0, 0x0})
setsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000380000)=0x5, 0x4)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00007b0000)="2f6465762f73657175656e6365723200", 0x100, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000018000-0x50)={0x2, 0x1, 0x4, 0x0, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00004d5000)=<r1=>0x0)
sched_getattr(r1, &(0x7f0000476000-0x30)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30, 0x0)
setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00008a9000)=0x100000001, 0x4)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000aa9000-0x4)=0x0, &(0x7f0000f48000-0x4)=0x4)
ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
rename(&(0x7f0000860000)="2e2f66696c653000", &(0x7f0000d0a000-0x8)="2e2f66696c653000")
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
getsockopt$inet_dccp_int(r2, 0x21, 0x3, &(0x7f00007b8000-0x4)=0x0, &(0x7f0000056000-0x4)=0x4)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$bt_rfcomm(r2, &(0x7f000065c000)={0x1f, {0x3ff, 0x7f, 0x4, 0xfff, 0x7f, 0x0}, 0x4}, 0x9)
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
gettid()
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
sync_file_range(r0, 0xffffffffffffff7f, 0x8000, 0x5)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
[  327.282753] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r0, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$mouse(&(0x7f0000aaa000)="2f6465762f696e7075742f6d6f7573652300", 0x1000, 0x101000)
ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000dd6000)={{0x10, 0x3}, {0x80, 0x8}, 0xbc8, 0x1, 0xff, [0x0, 0x0, 0x0], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 1:
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
[  327.385694] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x5, 0x4, 0x20)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f00001af000)={0x0, 0x0, 0x0}, 0xc)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000fcc000)={0x9, 0x800, 0x6, 0x1, 0x6, 0x0})
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000c3000)=0x9, 0x4)
ioprio_get$uid(0x3, r1)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
dup(r0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x0]})
[  327.457540] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000fb2000-0x5)={0x73, 0x79, 0x7a, 0x1, 0x0}, &(0x7f0000b97000)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
io_setup(0xb0, &(0x7f00001f9000)=<r2=>0x0)
io_destroy(r2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="")
gettid()
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
[  327.546784] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:53 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000f4d000)="646e735f7265736f6c76657200", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000964000-0x4)=0x0, &(0x7f00003e7000-0x4)=0x4)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000846000-0x8)=0x2)
2017/12/06 19:31:53 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x5, 0x4, 0x20)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f00001af000)={0x0, 0x0, 0x0}, 0xc)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000fcc000)={0x9, 0x800, 0x6, 0x1, 0x6, 0x0})
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000c3000)=0x9, 0x4)
ioprio_get$uid(0x3, r1)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:53 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
getsockopt$inet_int(r0, 0x0, 0x7, &(0x7f000095e000)=0x0, &(0x7f00004ef000-0x4)=0x4)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="6c6f8800", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
r0 = add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
request_key(&(0x7f0000dbf000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00007fd000)="262f2973656c696e75782900", r0)
r1 = open(&(0x7f0000563000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:53 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:53 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff)
gettid()
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:53 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
stat(&(0x7f00001cf000)="2e2f66696c653000", &(0x7f00009b2000)={0x0, 0x0, 0x0, 0x0, <r2=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
r3 = geteuid()
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000cf3000)={{{@in=@broadcast=0x0, @in=@remote={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@loopback=0x0, 0x0, 0x0}, 0x0, @in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f00008d2000)=0xe8)
setresuid(r2, r3, r4)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
rt_sigprocmask(0x2, &(0x7f0000b37000)={0x7ff}, &(0x7f0000060000-0x8)={0x0}, 0x8)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 4:
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000c5e000-0x8)={0x7f, 0xffffffffffff7fff})
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x5b, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f000008e000-0xe0)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00", 0x1, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000689000+0x84b)=@req3={0x6, 0x2f8, 0x8, 0x3, 0x6, 0x6, 0x1}, 0x1c)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000277000-0x1ba)="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", 0x1ba}], 0x1, 0x4c)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4)
sendfile(r0, r4, &(0x7f000018e000-0x8)=0xffffffffffffffff, 0xffffffff)
gettid()
bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$mouse(&(0x7f0000338000)="2f6465762f696e7075742f6d6f7573652300", 0x3, 0x402240)
getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f00002e4000-0xa7)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", &(0x7f000007a000-0x4)=0xa7)
r2 = syz_open_dev$loop(&(0x7f00006e0000)="2f6465762f6c6f6f702300", 0x77f, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000019d000)={0x9, 0x7, 0x8000}, 0x4)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000820000)={&(0x7f0000e86000-0x14)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5})
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x63)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = dup(r0)
ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0})
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"})
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000534000)={{{{0x2, 0x3, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {{0xa, 0x2, 0x1, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2, 0xff, 0x0, "fd69d9047658835fccf80ce3c759b809d8e28ff37381ecfc6faee9c7eab79ade5d9b91411a2aee2cac3e9e81c11f2ca0aad60f322380cba2b7c2c945907c91848064c240b3af0df69b317bf2d5769b2d"}, 0x160)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000662000)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4)
sendfile(r3, r4, &(0x7f00003db000-0x8)=0x0, 0x100000001)
ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000510000-0x4)=0x7)
gettid()
bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(r0, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
madvise(&(0x7f0000941000/0x1000)=nil, 0x1000, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00004c6000)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xffffffffffffeffd, 0x1, 0x0, 0x40000000000000, 0xe, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
[  328.162666] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x1, 0xffff)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000d4f000-0x12)={@generic="48be52e78480e4561c75b8ed8a45e242", 0x2})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
[  328.218721] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f00006fe000-0x78)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = syz_open_dev$usbmon(&(0x7f00006ba000-0xd)="2f6465762f7573626d6f6e2300", 0x3, 0x0)
dup2(r4, r3)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x1, 0xc, 0x664, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7f, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x4, 0x0}, 0x0, 0x4, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f000066f000-0x8)="2e2f66696c653000", 0x8000, 0x20)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r3 = getpgrp(0x0)
fcntl$setown(r1, 0x8, r3)
readahead(r0, 0xe6, 0x24d9)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
r2 = dup2(r0, r0)
ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1})
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00003d8000)={0x5, 0x9, 0x8, 0x2, 0xa8e, 0x401, 0x7}, 0xc)
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r6, r7, r8)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000cb9000)=@rc={0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0}, &(0x7f0000f8c000-0x4)=0x9, 0x800)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000fb6000)=@assoc_id=<r1=>0x0, &(0x7f0000bb4000)=0x4)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000dc3000-0x4)=r1, 0x4)
socket(0x0, 0x0, 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000e1e000)={r1, @in6={{0xa, 0x1, 0x8, @loopback={0x0, 0x1}, 0x40}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5, 0x3}, 0x98)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = socket(0x10000000010, 0x2, 0xc)
write(r4, &(0x7f00004b1000)="1f0000000104ff00fd434514234d0000000000000800010001ffdcffdf000d", 0x1f)
getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000b39000)={0xf37, 0x1, 0x1, 0x7fff, <r5=>0x0}, &(0x7f0000f97000)=0x10)
write(r4, &(0x7f00008f0000)="1f0000000104ff080471cf000000000000d100000b00020000000900001200", 0x1f)
r6 = gettid()
r7 = creat(&(0x7f0000c55000-0x8)="2e2f66696c653000", 0x4)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f000035c000)=r5, 0x4)
setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000de7000)=@assoc_value={r5, 0x4}, 0x8)
pwrite64(r7, &(0x7f0000499000)="a9c69d7a865e2b53d9b1b452e56c18a1cf4867bea62774c39cbcb7241d74084d15f4cce8606467af7ea8ad52e27f02780970252db8ed8876a93e61def63369628cfbd0756e5fce", 0x47, 0x0)
timerfd_settime(r7, 0x1, &(0x7f000061e000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000429000-0x20)={{0x0, 0x0}, {0x0, 0x0}})
ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00005fb000-0x4d)="")
r8 = memfd_create(&(0x7f0000e55000)="00", 0x3)
mq_timedsend(r8, &(0x7f0000a73000-0xfe)="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", 0xfe, 0x1ff, &(0x7f000027a000)={0x0, 0x989680})
kcmp(r6, r6, 0x2, r4, r3)
ioctl$EVIOCGKEY(r8, 0x80404518, &(0x7f00005f3000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000")
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r7, 0x84, 0x7, &(0x7f000093a000)={0x2}, 0x4)
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
dup2(r0, r0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:54 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
[  328.518871] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0)
bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r5 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r3, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r5, r6, r7)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12)
2017/12/06 19:31:54 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
[  328.565706] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'.
[  328.579191] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:54 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f000079c000-0x18)={0x6001, &(0x7f0000b06000-0x5)=0x0, 0x8, r0, 0x0})
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:54 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18)
2017/12/06 19:31:54 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
[  328.644707] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'.
2017/12/06 19:31:54 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r4 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r5=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r4, r5, r6)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:54 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0106434, &(0x7f00007c3000-0x10)={0x7, <r3=>0x0, 0x3, 0x9})
ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40086437, &(0x7f0000783000)={r3, 0x3})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18)
2017/12/06 19:31:55 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0)
accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000)
ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74)
fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0)
open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002)
syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800)
getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4)
setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8)
r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0)
creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r3 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r4=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r3, r4, r5)
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0186404, &(0x7f0000e82000)={&(0x7f0000a6a000/0x1000)=nil, 0x16a3dadb, 0x1, 0x8, &(0x7f00003df000/0x4000)=nil, 0x7})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18)
[  328.850448] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r3 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r4=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, r3, r4, 0x0)
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00006a1000+0x34c)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0})
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f000019e000-0x8)={<r4=>0x0, 0x0})
ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000eb1000-0x8)={0x0, <r5=>0x0})
ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000a08000-0x8)={r4, r5})
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
getsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f00006f1000-0x4)=0x0, &(0x7f0000b2c000)=0x4)
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
rt_sigpending(&(0x7f0000fe9000-0x8)={0x0}, 0x8)
setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f000069c000)=0xff, 0x4)
2017/12/06 19:31:55 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x520)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={<r1=>0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0})
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
socket$inet6_sctp(0xa, 0x800003, 0x84)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
r2 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb)
keyctl$chown(0x4, r2, 0x0, 0x0)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r2=>0x0, 0x0, 0x0}, 0xc)
tkill(r2, 0x26)
setfsgid(r1)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket(0x0, 0x0, 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
socket$inet6_icmp(0xa, 0x2, 0x3a)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000d67000-0x8)={<r3=>0x0, 0x8}, &(0x7f000095c000-0x4)=0x8)
getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000bb2000)=@sack_info={r3, 0x1, 0x100000000}, &(0x7f0000c28000)=0xc)
setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00003a0000-0x8)={0x0, 0x1ff}, 0x8)
fcntl$getflags(r0, 0xb)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000f00000)={&(0x7f0000e47000-0x10)=[0x8, 0x4, 0x3, 0x20], 0x4, 0x3, 0x80000000, 0x0, 0x5, 0x8001, {0x0, 0x0, 0x1, 0xbbe, 0x4, 0x8001, 0x8, 0xffff, 0x9e, 0x8, 0x0, 0x5, 0x7, 0x80, "5dedbc1aabcf81bf7bf11b1ab11401e8a800f847e72a7b95cf188e5e02760b0b"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
socket$inet6_sctp(0xa, 0x1, 0x84)
ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000d1f000)=0x0)
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000df8000-0xc)={<r6=>0x0, 0x0, 0x0}, 0xc)
syz_open_procfs(r6, &(0x7f0000dad000)="6e65742f64657600")
setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000dee000-0x4)=0x8, 0x4)
getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f000023c000-0x5)={0x0, 0x0, 0x0, 0x0}, &(0x7f00009b1000)=0x5)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
socket$inet6_sctp(0xa, 0x800003, 0x84)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
[  329.084194] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={<r1=>0x0, 0x0, 0x0}, 0xc)
tkill(r1, 0x26)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r0, &(0x7f0000f41000-0x8)=0x0, 0x100000001)
ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000903000-0x18)={0x4ac4, 0x3, 0x4, 0xffffffffffffffe0, 0x1, 0x62e1})
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:55 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
[  329.147845] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:55 executing program 5:
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 3:
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
fremovexattr(r0, &(0x7f000036b000-0xd)=@random={"6f73782e00", "5c73797374656d00"})
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
[  329.281962] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000509000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
readahead(r0, 0x5, 0x460)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:55 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
[  329.335636] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x0, 0x0, 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
getpeername$packet(r1, &(0x7f0000f4a000)={0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, &(0x7f0000c3b000)=0x14)
stat(&(0x7f00006d9000-0x8)="2e2f66696c653000", &(0x7f0000169000)={0x0, 0x0, 0x0, 0x0, <r4=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000d3a000)={{{@in6=@loopback={0x0, 0x1}, @in=@multicast2=0xe0000002, 0x1, 0x2b, 0x3, 0x7f, 0x10, 0xa0, 0xa0, 0x8, r3, r4}, {0x0, 0x5e2, 0x80000000, 0x6, 0x8, 0x6, 0xca9, 0x774}, {0x100000000, 0x1, 0x5, 0x1}, 0x6, 0x81, 0x2d, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x6d92, 0x1, 0x3}, 0x3, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x87, 0x2, 0x0, 0x2, 0x8, 0xffffffff, 0x0}}, 0xe8)
r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 1:
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
fstat(0xffffffffffffffff, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r2=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r2, 0x0)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
[  329.479268] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r4 = dup(r2)
r5 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000485000-0x18)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0xffff, r3})
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(r5, r6, &(0x7f00000de000-0x8)=0x0, 0x100000001)
io_setup(0x4, &(0x7f0000870000)=<r7=>0x0)
io_cancel(r7, &(0x7f0000b1d000)={0x0, 0x0, 0x0, 0x0, 0x4682, r0, &(0x7f0000b6c000)="bd95f07435d1b316e08a3f34eb0f692ffd3d94", 0x13, 0x0, 0x0, 0x0, r4}, &(0x7f0000ece000-0x20)={0x0, 0x0, 0x0, 0x0})
gettid()
bind$llc(r6, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00006bc000-0x4)=0x0, &(0x7f0000c8d000-0x4)=0x4)
ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:55 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000c87000-0x8)="2e2f66696c653000", 0x0, 0xfffffffffffffffd)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f000064f000)={0x0, 0x0}, &(0x7f0000e38000-0x4)=0x8)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
[  329.564528] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:55 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:55 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x0, 0x0)
2017/12/06 19:31:55 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:55 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r0, &(0x7f0000f41000-0x8)=0x0, 0x100000001)
ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000903000-0x18)={0x4ac4, 0x3, 0x4, 0xffffffffffffffe0, 0x1, 0x62e1})
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r5 = gettid()
pread64(r1, &(0x7f0000261000-0x89)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x89, 0x0)
getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00001e8000)={0x5, [0xff, 0x1, 0x100, 0x8, 0x129]}, &(0x7f0000fec000)=0xe)
ptrace$peekuser(0x3, r5, 0x800)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6)
sendfile(r4, r6, &(0x7f00000de000-0x8)=0x0, 0x100000001)
getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000c59000)=@assoc_value={<r7=>0x0, 0x0}, &(0x7f00003ae000-0x4)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00009d4000)={0x800, 0x4, 0xc70, 0xffffffffffffffe0, r7}, &(0x7f0000c32000)=0x10)
ioctl$sock_ipx_SIOCIPXCFGDATA(r6, 0x89e2, &(0x7f00007c1000)={0x0, 0x0})
ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x3)
init_module(&(0x7f0000d38000)="00", 0x1, &(0x7f0000aee000-0xd)="646e735f7265736f6c76657200")
gettid()
bind$llc(r6, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
personality(0x6000003)
ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:55 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:55 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f00003d5000-0x8)={0x0, <r2=>0x0})
prctl$setptracer(0x59616d61, r2)
syz_open_dev$random(&(0x7f0000b55000-0xc)="2f6465762f72616e646f6d00", 0x0, 0x2000)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
[  329.726820] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
setpgid(r0, r1)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r3, 0x0)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
r0 = open(&(0x7f0000cc0000)="2e2f66696c653000", 0x0, 0x1)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000bf8000)={@generic="6d3916c7c9abe801634e38cd02235594", 0x500000})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
r0 = add_key(&(0x7f000085c000-0x5)="6365706800", &(0x7f00009f5000)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00006b8000)="73432046647044be0f9e5dae841ab29415e32fb0590d902d30dda2887f2ab5239f4d5a338da5f44b320e75138815d5402479cc5fe48aef348fba8992374f36ad23a6f37268443235bc510e06f87d4e8428d71f410216a2ec7dc7", 0x5a, 0xffffffffffffffff)
request_key(&(0x7f0000292000-0x12)="2e726571756573745f6b65795f6175746800", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", r0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
r4 = openat(r3, &(0x7f000001d000)="2e2f66696c653000", 0x80040, 0x10)
renameat2(r4, &(0x7f00008cc000-0x8)="2e2f66696c653000", r3, &(0x7f0000f9d000-0x8)="2e2f66696c653000", 0x2)
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c035397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x200000008]})
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]})
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="", 0x0, 0x3)
[  329.895173] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
gettid()
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
r5 = epoll_create1(0x80002)
r6 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r7 = getpid()
fstat(r5, &(0x7f0000efe000)={0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f000014a000-0x1)=<r9=>0x0)
getsockopt$SO_PEERCRED(r2, 0x1, 0x11, &(0x7f0000f16000)={0x0, <r10=>0x0, 0x0}, 0xc)
fstat(r0, &(0x7f00003bb000)={0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
sendmsg$unix(r3, &(0x7f0000cde000)={&(0x7f0000540000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000956000)=[{&(0x7f0000a28000-0x12)="77dc240d990c5f0801186a5000953314a32f", 0x12}, {&(0x7f0000d51000-0x3f)="cf2a803bb99d79d0ef5140a8d089857bb65bccc3a2415ddb37dd1cdd76695f8103867f210f9bf7992e4f0b69d13521a624f191688f17f466180676d85b085d", 0x3f}, {&(0x7f00005fc000)="32a716b51fc8e6eb534711c1a66e21e15a987948e5f8587789be84a7d22f041b51fe4a9e0cace33dd5058374432794cb79f4395a7ded152c0a9af14b654b51ece06ac7184dbfe65d3316148aaccf8ff65288692e77a638d33e2646dd3da97aab424be0d0043028fe4a9557a4a0fbac790a4707331ea23bddef676c85c6d4c43ad570655cbb94cb0ff7e6c67e838fe4319da51dd344e0b74cc958338c67261a830e3b339d207c45ddda30a3f1aa75f8c2125af08e0c584cffcfbf570b7ff2bdab0b85ef069a9545951f74ea1e2593", 0xce}, {&(0x7f00005ea000-0x4)="579fbed7", 0x4}], 0x4, &(0x7f0000d22000-0xb8)=[@rights={0x10, 0x1, 0x1, [r6]}, @rights={0x18, 0x1, 0x1, [r2, r1, r0]}, @cred={0x18, 0x1, 0x2, r7, r4, r8}, @rights={0x18, 0x1, 0x1, [r5, r1, r5]}, @rights={0x24, 0x1, 0x1, [r6, r0, r2, r1, r3, r2]}, @rights={0x24, 0x1, 0x1, [r1, r2, r2, r1, r6, r5]}, @cred={0x18, 0x1, 0x2, r9, r10, r11}], 0xb8, 0x20000000}, 0x881)
r12 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r12, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r12)
sendfile(r6, r12, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r12, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00003f8000)=[{&(0x7f0000ffe000-0xa7)="8b78ca015e9840b899fd20d75b7fc77d80548dda3f89a812d7b43b3fc6300da26748f56521d103d3634e9aab5608d9d73b203f6e72829c80f53bb34219d939be5844b65ae65e5df197649f23ddd1d6c90cd9100531d7bfbc31e108b067b4f6db32cc189789000664de7ea818b3163bf85fb38cbdd562fd9793114e5d4ab3fed7e020899559dcd5a27fd5dd1d363f087c68fbf32a26aa6e34ccba540380ea0d74e953f08475cada", 0xa7}, {&(0x7f00005a9000)="13a5fe3e6749b764224c6504a16f5ae6c46f5e52ae608b544e107a9a224bf61c0535497dd12e9d97bcf43d933af29abda1fa3534debc6405466b6e9f66b89e94f90bbb8b7456ea3f616ec72081b2e8fc9a267be364bef9c91e2cf9973d509aa41dde6c010b961649a6e17d47c9743a9dd04507789f3ed54f7b5adc4060edba9e69c160a411e50542c6dff69bc24fa6373cdc20ea17f7b1216d67", 0x9a}, {&(0x7f0000ca5000-0x76)="875204f2679ae49efa8d80929623f8d5e868758c0aa829d2143d531384b247f7863237b94037b6fd3831f8de54cc5d8380d3d0ec2bad72abde732ed4ccc202e1ff70bcced0cce893af6f18510ea7be1944588862d9fb941983fcabff196fdfd8a1a5bb1ccdd4c0f884b7ffb7771cf767838bb97e2865", 0x76}], 0x3, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="0000000000000000", 0x8, 0x3)
[  329.949842] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="00", 0x1, 0x3)
2017/12/06 19:31:56 executing program 6:
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
[  330.031664] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00005f2000)=[{&(0x7f0000ea6000)="72d3dc88c1d835511f8b8b8c20e1438a769f3abb129c095b55b4b5ba37b058ec99d94694cd31c5ac55fcc2d3bd81e928266335bcbd0f3e33804ddbc51dbb4d11b696fe38716c158ca5aa6e5a9625e933c75cfe6f9ff8d2e869e273b3970eb360a0a22388495dff96f4c526772150af09cac32172281ffca1de17579294e48e26d09f400d2b2b0e281c686d6afa8f6b319c43363b46198fb7fa5355b0e6f5e19882695cbc502ac7bff20e2894d49f01369dd8ce3b055b2def78b48c5aab0c0d6b1be42e7bf423107f041bba392f15128626cef10d61b0b5adcb9ceb1b22943ce901c6f042b8dde1211f468d9780eee9e56c49f88a1bdd", 0xf6}, {&(0x7f0000bd3000)="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", 0x1000}, {&(0x7f00006d2000)="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", 0x1000}], 0x3, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="", 0x0, 0x3)
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
[  330.097938] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
recvmsg(r0, &(0x7f0000c88000)={&(0x7f0000d67000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, 0x14, &(0x7f0000fb3000-0x8)=[{&(0x7f0000a42000-0x81)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x81}], 0x1, 0x0, 0x0, 0x10000}, 0x102)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getrandom(&(0x7f0000558000-0xf)="00", 0x1, 0x0)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
2017/12/06 19:31:56 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000380000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000c85000-0x60)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$KDSETLED(r1, 0x4b32, 0x1)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
fstat(0xffffffffffffffff, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, r1, 0x0)
[  330.205836] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
[  330.243683] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000418000)={0x1, 0x7, 0x2, 0x7}, 0x10)
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0)
fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
keyctl$chown(0x4, 0x0, 0x0, 0x0)
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
[  330.296974] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 7:
pipe2(&(0x7f0000d3f000)={0x0, <r0=>0x0}, 0x80800)
setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f000057d000)={{0xa, 0x1, 0x40, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x0}, {0xa, 0x2, 0x200, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x2}, 0x4, [0x1ff, 0x7a80d523, 0x5, 0x80000001, 0x0, 0x7, 0x0, 0x4]}, 0x5c)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006f8000)="2f6465762f72666b696c6c00", 0x40, 0x0)
ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000bfc000-0x4)=0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
modify_ldt$read(0x0, &(0x7f00008cd000-0xe7)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xe7)
ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000204000)={@generic="cc07cf51c43ba9b05aa1931cb5a9070c", @ifru_addrs={0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}})
r3 = socket(0x0, 0x0, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000550000)=0x6ca, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000ed6000-0xc)={0x0, 0x0, <r4=>0x0}, &(0x7f00005bd000)=0xc)
sendmsg$kcm(r0, &(0x7f000028e000-0x1c)={&(0x7f0000f74000)=@un=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f0000c56000-0x20)=[{&(0x7f000009b000-0x48)="e396681a3ceb1a125f521eac302864aaa07678eef48d65b413ebc0e7bcac4758a47b22751588ac413e39f6bfe17dda995d1be3e8e1fd60250a2b0ccbccca8bd4beb7861f6154006f", 0x48}, {&(0x7f00003d8000-0xba)="06eb2bb6cab0047e86f082bf29a09a25f1de81d29577a5aadf8cfcaa07fdc86edf4517ae51f2342f9767e5a6f33d61954d79043d076813fe30ad222ec975cb490cff5ee25e9d88a7a9d217572e1a7d177f4752f6857968d433a6d18db393a77748772f8802a8ad6e8080dd82058e7b8cdf2104f9f3a4c92154ec2659032d6f5aa162f9774abe0ed6e17899fc5e99bf74514aae027f029cca435df79c6250ff09d86283eb460a68b57bde6338c47c2f2f65849b2edd8f005ab004", 0xba}, {&(0x7f0000897000)="57f00039e1863419e38587b5bf966432aef703d08ce9b4b12cc9691c8db7cb3689a737f74d794472dbe5f2cb7c54edd7e0e0006e70a1e98f66d0e9bcdd6d1555fd4b16926345ffea666f7911481f9597a2e5f437f05e1d336529e235f5ed6ecc2b7179214db077e99c0e206d7b8dd962a87bae7dfd91dc7e54594c5a523e53e22c0ff48ef7dc3dfdb84ad42c356ad39750dc50221e084de2493cefcc00352786db7473e608ee535127581427de0460a42bc18d6896718a539f508c8e3bbbd6833d9b30f72c", 0xc5}, {&(0x7f00002ef000-0x1000)="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", 0x1000}], 0x4, &(0x7f0000cb5000-0xa8)=[{0xa8, 0x1ff, 0x0, "cd3e60f2184a1117f5006e3c61b632d64772327d5d6f460fe7ab0e384036d2c31a4edf689da786e771cc0bcb1c8660022c89042c01f59caf3c2f2b15bcc544c8a5737c3fd6b8dfe0ec567f2ab51b443240584f630254828a732fd6b85df4bacfad685fe73510beaf4003cc01c9613a15e5a8a173cd3a0a79459648cb2883affdeeac44201f657e6fe202fb78cbdecb3f7ffef7eba144de3949283717"}], 0xa8, 0x20000000}, 0x0)
r5 = getgid()
fstat(r2, &(0x7f0000fe0000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
setgroups(0x3, &(0x7f00006e8000)=[r4, r5, r6])
r7 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r8 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r9 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f0000582000)=[{&(0x7f0000f4f000-0x1000)="2aa0426da14621f56e5bbbe11d03af4f24c528aba4274214e5eedd04a6909fa41b6b60a8b0a4e5c6d732553ff57c73ba3a4fbcbdb3f396afd860320d95ef77bb9ab85838d8d35e91be7f3d51337e613e90ef22fe4bcf5d6dca3e430b73705fa4b82cfc77f8c38adabaa79b40190d83e0308a10728dd9d6d92ac3b72838fdebd685d80a4ded324b9696b2ae9be7d8e2f2877885f9421dd5f816083e1c80b10231db58f239e5a08d94b5b613ec6308e25627faa1dee6625ee65c5d137dbae3831d76b3f591d86457bfae6634c281527f30f0fc324713dca7ce296d3a5a14d40eae33bfa60283f99f68394a7402fbef5551b2512cf95dcabed20ae74af295c612c1e0c56399125c4c70e9d6e1e6843d5c3840aff550712aab3eb2bb9c35430b15a57b682cb61607b62953fbbaddc37542fa010283d36b9ebc4d49386a9cf87e6ae23cc4bf5e4348ac041db733fcaa632ed8adb202694fcdd4cccd203570287bf093bbed5e690e327b6ba60a7416cf8ebf3f0c55d4835f6a9095a5d72dfc434597880d3280ad21ca0801efe688fcf1de7068165b91ea2eda89cbc04ccef2cd273032558acd0784b54cacb073fdf8eb2e1962181069b0e926a45a967f184e0249b184caf535ab582bf8a7b285e0c27aa890c83e95187400bb6752387945ff010151761b914111805d05dee6cffd06fd634197ff194ed4fe02a88c8e04b8ef0e64a828a3d48675cd67368ee85516055f6c4cb112801e9bfaed8603035ee62b75f00b6d846629ede34ec6db6cc1f9989a0d4cd4c306382decdbe5298eb4774a9e713c30085c531c7c23d5126ceee5de3decd05224650fbbda4cf90af21b7ac3765ccc5979f020a4af71c2432889015373d8cb1559e499039150476159840f1ba66e32dbaa6dfe8427443067c8fb162279b600d1d7caef34a1b779e16222f41dec689a0a206e9469be8c6b474afe9d02702f66c121788818d7e12317eaf37f70694bd2d18f1588627473005f0132bf315c852ae10edb67c3842e05236a69ae19c0667f16a148e305a64b51fd05e6142dd8e4f4d9efa18b832e56551ce724ec7db7ff941ceff15334758b965e43a1f01cf8f1bbcf2344b26cd82c4e92ebfbd3d1e9e389c2650811f70052ac356a3820687ef521fc69b6ae3cca8a1def48a61c0d6ca9bc80936a08bb278b441e7302b67239f4c2ef813455b0e73bf6e0fab6e17ba450adb11787fe221826bce2e0d302fe01d3940d086e4192ce5aaf75fec4bf445e887e477d859ab00b47799b5c1462d291e96833dd2e416a23e492799f32980fa1e3993c969628337c4ebc9699951e9e801b4148bd23d7e33693593967806ec67d61c222ae80e1974b534cc9225f094eff298adf276398e7cc0409a6362f2e0277f30d37148e89898d8d30f50af3669ff731ce9571323311e03016124ad3d8e25509164963bca90f397b02058fe41dd8acd062ad2d58a13d5a1ae62dde5bf0f365a97586c459ef0b98d1d40017ccbe4d7a7aabc7587e7c12b267a5e5aeb037226ad06c3d8eabc72e9ad06903bf45ac1a70ae40bb99e23f07bed017d2222cf2c5d7e21d66c308a923181dc9de3510bc40e7f102bf323523f90f9f2ac041c7ff78ef0d401873325c24e194361c36f85d5952ab5d414db6b3878cf0700750d45e0043ce1a7190304abd8ef9f7fe678510d5fb7136bda2a652037f7558aeb2135895fa4d74ba38dec78655f9d682c268d4e29e49761b06478372e892b4a64e317bb0bd3104354c25e8c02cfc6cd1a14d52a7b878c4e40203c22a41066e9317fe105208923cef04059bf29e4b776111e8d54911bbca38c2ecd481f05d92edf80f5587237ea2f1c2b6bb16b05b79e75f9d8d4c78908b84612c1c743a9df43e6ac5e57eb4f9904c103b84235d0465aacbc3dd10065ea95bdf192ef685efec5028abc3641a05cb2faded16b592552f5b741348eab793b140aa7674815067b0b5da09e2a52470b367c8442d234cbcd494f8612f7e6d1009aacf216e26affe847ec35305c9020e2bf0ac5672da12d00ee40a074798f406bd9ca5e6e131f984d9f1b54800b525a9234d45a0c86a2a3b583882b4115a688f5a7d28797096e1046ed54781ad326a1c90f4a0a1f88eba622e11bab0030c992664e1638e900ca4be750b04395cf38b51b45b7b2a363f78fe9d0728369d916d49daf912dbe9d285f884dfe280ae53aad4de78b8a38320d43d26b44c025d54b1ae5dc9545a9e871aba01b0178d9f044086c79f13eab5a9016b93fe31d065ddaf838f027f434d64537417af7ea4a632191da70d188829687187f57c3546836f357cb2f9884f2a71cf78820db66407ad942c1976999a810c522467c78198575c1fcf370be54456e08bf1a182443083994ed94e9755975009f7180244c4706d757842cac5d2ec5d30aa2aa23110fccc1e7a116c80a44e09fa4fc2620f027189e7a627695583689ad80a54fb99ff812c0067a9a7ceaf849d522a1721a4cda4db00ddc75edeab5428847f2b6a7ee519b047dab497f412ae4b1e059bbddd90150f5865c10e5601cd2eb6b5d1ad4f1b81cb98dfe10312d7da623ecb5c7b4648b6624c9d21efe5c03c166cb388e374e5c8b21b85b5e4aaef3d1bca83868ba3fd6a35587c046bcaa3d615f7b06ffeabfd42236d70ec7293081a36ecafcbd6299754edb7eee3566af9ed0919c50474ee8b8acda7eed86d75af4365dbcc4960e1aa43b1803d20b17ba3b50ebcaa4763d28d67170b55b01c47476968b4e4f09b6c4622408af7f7342db1848dd5f8e3682aef88d4877b437278b2e9a1f085d985164558e783b22c5217f619d05a61ff773c18e417ad575a8f3199b08ce694dee9f4fb2fff9911705377f01dab4c51af96e4f7d26edd0e09b80b341d2e3b548d0f74852cb1a54e98503cdaf4e044a2de8d722690cb3501890f53f7ca3858f10d0a2f042ddb3327395e2b8b487043433a31c2c8f5e9cd692e169086b8cbd1cee19a9e25e9d44c41ea9747387f49bf89f99290dd595dc1aa315fe6f5da158ef54d7727e19ad490b64ae5856ff1edbbe534aab9aa46a8988ccc5c0e0e7d0dde57ecb8c1f0e9de7e554ca2c2d04dca8095cef9786f4a48f10605c0c466595f0f273e4695a2f345c78ee4b29b8b95cdbb29fca01a10ec5559a89f044db6daecff5dee5f9d7073f80a032d3cfbc7dd5a706908e73c7b4c067cb0cca2ebb27826237fc9c7f9d56f40377d8f667476f09017d736612d247fc94d736008a90e4126a26553f35b546548e620d9ce8bf7924dd966f7bf2071524b2cb6bb18f58be4ef2f0705ee8fe4b077715c6bde92bc92a242adeda70ab0312d42ddcf080daf299a9b5b64deff66a3f5c795c70dc1e4af3d4afc38607fb7d531af00d8dfaaf6849e4e5b47d623a5ecb2c382b98861b32390cb5fa29d93a8ac32b372ba5cbd5fd130b817607bf26f0d9346ba7bb21c4b24e9c0663b619e8aa20464343af791ffeb184e072172f6e2a5a3c4f671cf639a7b500f7f25e943d8c660b5b30178bab6c1817d87ff26386ffea4433dfe09fe3ac0f4b203d2ddea283e1ae6e270a2ec3e2db827bac9ea91802ccc449c614746a1c134d16ae29b5560ed7a96e799d6addedea4750873a3a7506409c045a88eb92d9c171f85ce7ee3e329ecc32a925181749882d3b3ec0d057859d6fd5809d30f0e5b3f512f7f420673fb5dcfcceb9c78434879372096e1a339b0cb3fb33046f92b5a76eb4af149d6d2d58104d04dd241de13eb91d80cace6ac697a7f485115ba9fd6c9402de8bafdb37121b34c920d802bec7c82d969d1a1c084e059edd0e5e805d01574f2492243e758dafc74d00c38d516f6b7a201d986885fee454ecc81301149aaa2479ab14f5040664df65558c53eb00a455cf74dcadeac5617ff9986e7aba37d67b131b8d07e17963010990d177b489e4b9fbb94cdd407bd70338433723a09ad4df6b34259dcc81dd3495c25ad9f00d05c0fb0783e48a5b4097b99356243ac99cd72a88eb494a5beb2604af544941a9b740ee56cef56dc33f0f1668e185ecf09ebdb9a2889527fd586c9fbf48587347fbe1af6781775b432db5e32601368d460506d82c4052202fd3e9fbcda543a52fddb3f3e4c9d3c1abba1dd9fd8c9d42cec5189972d1e38f795313b6046a09f8e05d0451b779ead2be37e1f2b24c912cd2e2970807482d2eec7bd29f5de9512a06b70d9d14989e7dd1f70c38191f0e81260f2f00281915cb90eef1e2d7677b4af9805e91ebd573c0203e9067eb70be8ce7b69e7fa8af577115fc9d15c56e6b9dc5c95c72c2328dd115d50acc2b6583c65080586015a1e70d86bf1aa2a15325e5257b56e68aa24ff7f8d144419c0c029ef105082f8f45004a85b680af353eb23c42920cc98e1fdb238e8fbb06a48300488cd9e46ebcf942d71c315619452cc4616f6c3b5c62ba9b51fc372e811419646bc05e9a1b64bd904f04a197435e03ff10c4968c4112a146a2cc343e62d7507f0517282aabd2130c728dee5342f204c6256009f3d979da6770ff5ee3a0e7054fcdedf34508822eb9a0bfbaf6abca468118b054fbf5123ad329e2d7aee6fef0af0898cb66122a81b5e68e1f0bd96c37003d3a438ff9ce82dfbd739564034e7164d7df0c5eea31b71c85eb6507b13fee2f8645154d3b99b4a79576b4c9ab7445cb6ce504fdeea700b80b80dd220b8fb8b6e321daa066087e27d5f1ebabe2c5a277c08f49f4f20b8fb6465cc836a9cdefe7134346c47cfc3d2fc5bc05a0190dbff8fa02cdb52856860144869f994be82c478a3d36c5adab9a39beae2f69994068dd6f464ed77f7200871d3f20dcf0ebfe0971718159a19f4947fb9f9c5b3aa9723eb8bd9bc1153c5beb929de248ddc7209228cc6806716ad780cfa18cf4cc2487f1c6b42dc3a6620ef254d96bfe92f93f8897b9cfa2bc99f979fcde65ae1cbcf0c3c71dc73d1845746b030dccd36c8c4295ced65ccf4aec0e4351a0abf8f9660979df0252dcf2cbb2125910874b786d587a5534e36e16541c99cabdcd57ba0dd11b0268ec1d5483b6e3941149442784c57fd213f2921277357e9a028d154b2a9e49ece250dad87f2e49c8c4e3de834a40fd6140eddbd0c78f4fd684fd30221a8c7cdec9e1c67d2c43ae45c2491b6587694dceb36f30776ad4671729915bc4b16be2980a85a6db4f9297c07dc8d20afc765df2ea9d355221c1f87ffe737268fcfe9cfa7679a0e8e6af93cda2204b80695bbe814aca654f25077f7a2248f8ed50c7791ef2a0c6c37aadaeacf107a639f8f8e96122ff8a2660fd60fe8bf7ed02ac5dab58f653eb077a2a488eae75b8fc10ac01986daa184fc98c2727473c3faaccfb47bce700f8a16de870d14ff3feeb0e3c2ee9d9062c56dd233301b7f438328dbd16584889fbe0351dcd4985b47921f08ee9cb5754e13f9f66d0c66bc030331823de089d8a14cc943d2c0cb90e6681723adb7430625aa95b5eebbd5e38f71d04bf28dc6d9fd80d97d4052b4b8cae70103a12c1e4171d5021d3e924fa8bf49fbb42c632c3b15dd77812efe7f44baceb7d785f1472bafbbf59776899ac19aba7bd7436dd4cef8f30d1d8185548352d4058e401d0314af69d1616755fd3423949305255c14effe2cbc5365c0609bb94e109a841a655c84e725db46c5ccc5aa0e6a2c6682faffa7f0c26e80aa01f58e8d900a5df1cda4ff58a50b225e82af9a0527e4f54bf342ebf449ba51eb5199009f6db6f241414fd825378fea8226e34c023630ff2e3179cac8e55df880c7da6872162064", 0x1000}, {&(0x7f0000545000)="9bf0a9bbf23d12612c4560792847d26a3fa69de934f3cbc75bdf2b4556cc4f0cae78ecca8a207cc9afc19ddc71d65265b6da7fc44a9b154657f046dbfdbb63c2a21aec2f8a346ac412b3c7bae017ba1071567fa7e3ea389553b24ea256", 0x5d}, {&(0x7f0000fd8000-0xce)="2651996d779b75531754d836adda3302d8d8aacf5e8aad577cb28b056b021aead42785737dcc5b2dbb1f7b822e0c45c37a8feb7c0b28e2109207f774d902c4d85a76570464cfc404c3c0c939e04f584ea25ae65ad5cf0c952bcd55c90ce1f58092391c1e5c79da045968b28ec29f48fc808668a19be2cc09f79a96de45c1b2f40fe027d6abe448e16b4ebb10d01279b992a046eb92c5c6125e291c30d7bb6ce04046ab9338f1d5f3b340302b0b0223da911682fe1c2145cb3b1bad436a2db21b11ac2f9f9b7cd6ae9b55e0e32d94", 0xce}, {&(0x7f0000f9c000-0x92)="608c9e5f2d3f36432598e7f5ff07cdc3f018bc75ce7bbbbeb49e76b348761c5373b3af693d08f310b07e7ebd3caae61bbad3333c2644a32680238f365f0dbab0912453b95a3cff6eec9b9509e667497a1a5117743179336483ac55cea39e0f87761ef87a6f2df57e9f6d9e946b39d8e730388b0e4ba7e56ff60801441c14440fdbeac00b30727bbfd057d8f30f3d146131183de16324c163e68e664903e40e21ac9d96dd1909d284ef29f44531a41bfca7c03ee1f9f6c65331aa81128fc92e38702ffeae3df035e0eb17d7467f3daeb117", 0xd1}, {&(0x7f00006e9000-0x9e)="58666ed6cfd33b9d95e2a398b299d5362d61a68a2b1ca9e3116d390e260ff6febc1803b4114b9c568dbd17fd737b17721816e270380cb0015fbacfd9f8071ca01d19aed0677ae4e45566bef482e3195aa54831a585887d80b814299285da5d4f571c67f12f75ae769afe7992f393afd4f91059c17f89836052c2302a318f6425c61b5953817d8fd10a97f371ecdcf6079e998459d709d39a2ae6b25a86e7", 0x9e}, {&(0x7f00004f8000-0x78)="56716e3ae3862e65a8e4373e61d62796b682bbab513ed86009a929990359b1cbba0d73ecdf6fba93ee2a2d6600783a7189578bed08ca51fd948b019035ec6ed41d20262489d1d1e8f16aa056f682db89e7ce93073434c16e0729153043657aa065978480248d738f67ce26bf94d8f8a7f2ed2fb4789a3c0c", 0x78}], 0x6, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r9, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(r1, r1, &(0x7f00000de000-0x8)=0x0, 0x0)
getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000e13000)={<r10=>0x0, 0x1ff, 0x2, 0x800}, &(0x7f00003c5000-0x4)=0x10)
getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00005a3000-0x18)={r10, 0x1000, 0x30, 0x2, 0x5}, &(0x7f0000e6e000)=0x18)
ioctl$LOOP_SET_STATUS64(r8, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
pwritev(r7, &(0x7f00007bb000)=[{&(0x7f0000335000)="34568533d7ce24c4c74d39d39c6528c69da9e9c03b705243444ee8d4fc152d3e458e1c7ae699c4f410bfda", 0x2b}, {&(0x7f000000f000)="d5ff760d09c62afa64a3578d5920633f8ce5deeafda3f3b4314deb345b1a985f743c7cb3ec71ee780609e2cd3fbcac2246042b9662403510f17341956d2dda18c1742ac62d8461b2de5d5a3c1b796dfe", 0x50}, {&(0x7f0000891000-0xae)="3bf44487a27a24f15f033ee14b8d11a1e701c7489c4eb75846540b2676d9b10d4f5c1f40030d939e44a9b2155f6dce0f13193eb12b27ab7dfc8878c176ad9ed3647e9dee5a0728a61a676daf92976f5fdae8c988ed44ec391f23df084af47994ed8ed37c80ff9ff4c82044f4f42daac55d6dc6ccb6ae9bf1d0f1f7084f3f9d333ebe6959d74e489b7eef26655c875cf7653301b416150898f04434b6d142374ae1f68f0fb282c8a910af6afab215", 0xae}, {&(0x7f0000b3a000-0x58)="ae59b093f4e1de28990f59ea8347f85accd296cf8d896bb6142ec16b279e96b9375e1d9c59fb8b3698da78eea5a08fcce46c6fdde96287fb68e0761e337d74617f1c9603b65fc2f0fcba919ce06f85c409c9db07f659", 0x56}, {&(0x7f0000f94000)="5d05974c1bea7a703a005e6fa4cb7d1840b2359c2213a1e327821f25dcbb695fc72074140e83036f73eced2b4e77146af1b118aaae899ce8c85d26742917de3732e866e757b8cb55ec4e4f669ac3438de3a8dd25fa6beca62c20681f3209ce36d801cd3308bfc9e10985c07f2a7aa8dda147dd2e7ee365d13be9ff0f192561", 0x7f}, {&(0x7f00004d8000-0xff)="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", 0xff}, {&(0x7f000068c000)="b1969ee37da3fe25c1884ea5fd95aa267a9d91d9a7a402e928cba36e506c902d0dec236007f4f5de036ecbe7baa0f08bdbea17ddeae49b6522b928d3d421ef43b29a08ac5490add462d1f92655ce21273c7747e3621931a202e4956cb48ba3ad76b82f1e2dc0c1fbbb0b2c720a4a181e2a94ad6150c87a878ab1d843e7d5c5e14ee629e5452d840d0c0a93ae72f5731e010405", 0x93}, {&(0x7f0000b56000-0xa2)="05a7579bc0b0d62645902c39894de314ef07ece435b8976fe3bafaf8852d49cf3387e879259dfb87d49a6dacfe4c0a614e10f6fdff237f798292bc76dbe4692757217f755327f50a95a77f2b859a05bc0a1b19a91f24e779ecc8d5d696e02c0debf01de4d5bcdc68e4934105a2a98598a7761d134863353bb926c0b5c1b5d6e78ba8df06715381f975e138551c3587aac74ec50f5af798b0962d1f2d2e3ecdf7ab36", 0xa2}, {&(0x7f0000fd5000-0x75)="4b5b159186c785e24350380c38a55dd843c2b32d0d8bf72ef961b32663ccb72849b745031cc354b8593716de1dd94d9b5842d295408f433027aefcac1fa131d48b42202436ea3485146bb5093a2238204bc7fdfa29c0b707be97e273a934d56409ed00eb1931355f2ed96b9e0ab7554b1d1adcf76b", 0x75}, {&(0x7f00009c4000)="8692", 0x2}], 0xa, 0x0)
rt_sigsuspend(&(0x7f0000070000-0x8)={0xffffffffffffff01}, 0x8)
2017/12/06 19:31:56 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
[  330.397939] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r2 = getpgid(0x0)
ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000295000-0x4)=r2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4)
sendfile(r3, r4, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:31:56 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
r1 = dup2(r0, r0)
ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000482000)={0x3, 0x1})
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4)
sendfile(r3, r4, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:56 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:56 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
[  330.622861] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:56 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:56 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:56 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
[  330.689751] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80000)
r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000303000-0x4)=0x7)
link(&(0x7f0000d4a000-0x8)="2e2f66696c653100", &(0x7f0000eac000-0x8)="2e2f66696c653000")
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f000040c000)=[], 0x0, 0x0, 0x4, 0x0, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x6, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3)
sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
[  330.757841] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:57 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:57 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
[  330.840006] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:57 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
[  330.922038] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f000027d000-0x18)={0x0, 0xa628, 0x2, &(0x7f00007a0000)=0x0})
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:57 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:57 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
[  331.091170] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:57 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x20000, 0x400)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
[  331.166673] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2)
sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001)
gettid()
bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]})
2017/12/06 19:31:57 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:57 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
[  331.420063] loop_reread_partitions: partition scan of loop0 (2�]�fI�����B�!S,��D�') failed (rc=-13)
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
[  331.490681] loop_reread_partitions: partition scan of loop0 () failed (rc=-13)
2017/12/06 19:31:57 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:57 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:57 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
2017/12/06 19:31:57 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:57 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:58 executing program 0:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0x0)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
2017/12/06 19:31:58 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
2017/12/06 19:31:58 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:58 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:31:59 executing program 6:
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r0=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r0=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:31:59 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, 0x0)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:00 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:00 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 2:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r0=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r0)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0x0)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
inotify_init1(0x0)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
gettid()
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 0:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 4:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:01 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
2017/12/06 19:32:01 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:01 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
2017/12/06 19:32:02 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x0, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
2017/12/06 19:32:02 executing program 3:
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:32:02 executing program 6:
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 3:
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
inotify_init1(0x0)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, 0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r1=>0x0})
r2 = getpgrp(0x0)
kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14)
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, 0x0)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
2017/12/06 19:32:02 executing program 0:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0x0)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:02 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(0xffffffffffffffff, 0x8, r1)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47)
2017/12/06 19:32:02 executing program 1:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:02 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:02 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0)
accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000)
ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74)
fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0)
open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002)
syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800)
getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4)
setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8)
r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0)
creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:32:02 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:02 executing program 1:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:02 executing program 4:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00004e9000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
open(&(0x7f00005c3000)="2e2f66696c653000", 0xffffffffffffffff, 0x20000002)
mknod$loop(&(0x7f000045a000-0x8)="2e2f66696c653000", 0x14, 0x1)
r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]})
2017/12/06 19:32:03 executing program 1:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:03 executing program 0:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:03 executing program 3:
r0 = socket$kcm(0x29, 0x5, 0x0)
fdatasync(r0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0)
getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00002d1000-0xb)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000d21000)=0xb)
2017/12/06 19:32:03 executing program 1 (fault-call:1 fault-nth:0):
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:03 executing program 0:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:03 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0)
accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000)
ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74)
fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0)
open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002)
syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800)
getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4)
setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8)
r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0)
creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:32:03 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:03 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:0):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:03 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:03 executing program 0:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:03 executing program 3:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:1):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
[  336.826551] FAULT_INJECTION: forcing a failure.
[  336.826551] name failslab, interval 1, probability 0, space 0, times 0
2017/12/06 19:32:03 executing program 0:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
[  336.830558] FAULT_INJECTION: forcing a failure.
[  336.830558] name failslab, interval 1, probability 0, space 0, times 0
[  336.830568] CPU: 1 PID: 24654 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120
[  336.830572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.830575] Call Trace:
[  336.830588]  dump_stack+0x194/0x257
[  336.830601]  ? arch_local_irq_restore+0x53/0x53
2017/12/06 19:32:03 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, <r4=>0x0})
r5 = getpgrp(0x0)
getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:03 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:03 executing program 0:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:2):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:03 executing program 0 (fault-call:0 fault-nth:0):
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
[  336.830609]  ? find_held_lock+0x39/0x1d0
[  336.830642]  should_fail+0x8c0/0xa40
[  336.830650]  ? lock_downgrade+0x980/0x980
[  336.830663]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  336.830678]  ? map_files_get_link+0x3a0/0x3a0
[  336.830684]  ? __lock_is_held+0xbc/0x140
[  336.830700]  ? find_held_lock+0x39/0x1d0
[  336.830726]  ? lock_downgrade+0x980/0x980
[  336.830760]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  336.830776]  ? rcu_note_context_switch+0x710/0x710
[  336.830798]  should_failslab+0xec/0x120
[  336.830810]  kmem_cache_alloc+0x47/0x760
[  336.830824]  ? fput+0xd2/0x140
[  336.830841]  getname_flags+0xcb/0x580
[  336.830848]  ? SyS_read+0x220/0x220
[  336.830863]  getname+0x19/0x20
[  336.830872]  compat_SyS_execve+0x1f/0x50
[  336.830882]  ? SyS_execveat+0x60/0x60
[  336.830892]  do_fast_syscall_32+0x3ee/0xf9d
[  336.830912]  ? do_int80_syscall_32+0x9d0/0x9d0
[  336.830930]  ? lockdep_sys_exit+0x47/0xf0
[  336.830940]  ? syscall_return_slowpath+0x2ad/0x550
[  336.830955]  ? sysret32_from_system_call+0x5/0x3b
[  336.830972]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  336.830992]  entry_SYSENTER_compat+0x51/0x60
[  336.830998] RIP: 0023:0xf7f66c79
[  336.831002] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b
[  336.831011] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8
[  336.831015] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000
[  336.831019] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  336.831023] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  336.831028] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  336.887616] FAULT_INJECTION: forcing a failure.
[  336.887616] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  336.887627] CPU: 0 PID: 24677 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120
[  336.887632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.887635] Call Trace:
[  336.887647]  dump_stack+0x194/0x257
[  336.887663]  ? arch_local_irq_restore+0x53/0x53
[  336.887692]  should_fail+0x8c0/0xa40
[  336.887709]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  336.887735]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  336.887757]  ? lock_downgrade+0x980/0x980
[  336.887767]  ? __lock_is_held+0xbc/0x140
[  336.887796]  ? find_held_lock+0x39/0x1d0
[  336.887810]  ? check_noncircular+0x20/0x20
[  336.887825]  ? should_fail+0x23b/0xa40
[  336.887832]  ? lock_downgrade+0x980/0x980
[  336.887856]  __alloc_pages_nodemask+0x338/0xd80
[  336.887870]  ? map_files_get_link+0x3a0/0x3a0
[  336.887877]  ? __lock_is_held+0xbc/0x140
[  336.887895]  ? __alloc_pages_slowpath+0x2d00/0x2d00
[  336.887902]  ? find_held_lock+0x39/0x1d0
[  336.887929]  ? lock_downgrade+0x980/0x980
[  336.887967]  ? rcu_note_context_switch+0x710/0x710
[  336.887988]  cache_grow_begin+0x72/0x3f0
[  336.888005]  kmem_cache_alloc+0x403/0x760
[  336.888033]  getname_flags+0xcb/0x580
[  336.888042]  ? SyS_read+0x220/0x220
[  336.888058]  getname+0x19/0x20
[  336.888069]  compat_SyS_execve+0x1f/0x50
[  336.888081]  ? SyS_execveat+0x60/0x60
[  336.888093]  do_fast_syscall_32+0x3ee/0xf9d
[  336.888115]  ? do_int80_syscall_32+0x9d0/0x9d0
[  336.888127]  ? _raw_spin_unlock_irq+0x56/0x70
[  336.888157]  ? syscall_return_slowpath+0x2ad/0x550
[  336.888175]  ? sysret32_from_system_call+0x5/0x3b
[  336.888195]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  336.888217]  entry_SYSENTER_compat+0x51/0x60
[  336.888224] RIP: 0023:0xf7f66c79
[  336.888229] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b
[  336.888239] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8
[  336.888245] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000
[  336.888250] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  336.888255] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  336.888260] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  336.992758] FAULT_INJECTION: forcing a failure.
[  336.992758] name failslab, interval 1, probability 0, space 0, times 0
[  336.992768] CPU: 1 PID: 24710 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120
[  336.992773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  336.992776] Call Trace:
[  336.992788]  dump_stack+0x194/0x257
[  336.992803]  ? arch_local_irq_restore+0x53/0x53
[  336.992832]  should_fail+0x8c0/0xa40
[  336.992848]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  336.992867]  ? __lock_acquire+0x6e9/0x47f0
[  336.992884]  ? find_held_lock+0x39/0x1d0
[  336.992913]  ? lock_downgrade+0x980/0x980
[  336.992951]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  336.992967]  ? rcu_note_context_switch+0x710/0x710
[  336.992993]  should_failslab+0xec/0x120
[  336.993010]  kmem_cache_alloc+0x47/0x760
[  336.993017]  ? find_held_lock+0x39/0x1d0
[  336.993045]  dup_fd+0x110/0xdf0
[  336.993052]  ? lock_downgrade+0x980/0x980
[  336.993076]  ? __fdget+0x20/0x20
[  336.993103]  ? lock_downgrade+0x980/0x980
[  336.993116]  ? __bpf_address_lookup+0x2b0/0x2b0
[  336.993137]  ? lock_release+0xda0/0xda0
[  336.993149]  ? __free_insn_slot+0x5c0/0x5c0
[  336.993176]  unshare_fd+0x17f/0x280
[  336.993189]  ? mm_init+0xb30/0xb30
[  336.993202]  ? kernel_text_address+0x102/0x140
[  336.993220]  ? unwind_get_return_address+0x61/0xa0
[  336.993233]  ? __save_stack_trace+0x7e/0xd0
[  336.993248]  unshare_files+0xa6/0x290
[  336.993256]  ? depot_save_stack+0x12c/0x490
[  336.993272]  ? SyS_unshare+0xfa0/0xfa0
[  336.993285]  ? save_stack+0xa3/0xd0
[  336.993307]  do_execveat_common.isra.30+0x3a3/0x23c0
[  336.993316]  ? do_fast_syscall_32+0x3ee/0xf9d
[  336.993323]  ? entry_SYSENTER_compat+0x51/0x60
[  336.993349]  ? prepare_bprm_creds+0x110/0x110
[  336.993360]  ? check_stack_object+0x68/0x140
[  336.993377]  ? __check_object_size+0x25d/0x4f0
[  336.993393]  ? check_stack_object+0x140/0x140
[  336.993409]  ? do_raw_spin_trylock+0x190/0x190
[  336.993424]  ? rcu_pm_notify+0xc0/0xc0
[  336.993440]  ? strncpy_from_user+0x323/0x430
[  336.993457]  ? mpi_resize+0x200/0x200
[  336.993481]  ? getname_flags+0x256/0x580
[  336.993501]  compat_SyS_execve+0x3f/0x50
[  336.993512]  ? SyS_execveat+0x60/0x60
[  336.993521]  do_fast_syscall_32+0x3ee/0xf9d
[  336.993541]  ? do_int80_syscall_32+0x9d0/0x9d0
[  336.993558]  ? lockdep_sys_exit+0x47/0xf0
[  336.993568]  ? syscall_return_slowpath+0x2ad/0x550
[  336.993583]  ? sysret32_from_system_call+0x5/0x3b
[  336.993599]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  336.993618]  entry_SYSENTER_compat+0x51/0x60
[  336.993624] RIP: 0023:0xf7f66c79
[  336.993629] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b
[  336.993644] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8
[  336.993648] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000
[  336.993653] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  336.993657] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  336.993661] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  337.003934] FAULT_INJECTION: forcing a failure.
[  337.003934] name failslab, interval 1, probability 0, space 0, times 0
[  337.003947] CPU: 1 PID: 24715 Comm: syz-executor0 Not tainted 4.15.0-rc2+ #120
[  337.003955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  337.003959] Call Trace:
[  337.003972]  dump_stack+0x194/0x257
[  337.003988]  ? arch_local_irq_restore+0x53/0x53
[  337.004020]  should_fail+0x8c0/0xa40
[  337.004035]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  337.004048]  ? find_held_lock+0x39/0x1d0
[  337.004060]  ? check_noncircular+0x20/0x20
[  337.004075]  ? find_held_lock+0x39/0x1d0
[  337.004103]  ? lock_downgrade+0x980/0x980
[  337.004140]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  337.004156]  ? rcu_note_context_switch+0x710/0x710
[  337.004166]  ? get_pid_task+0xbc/0x140
[  337.004189]  should_failslab+0xec/0x120
[  337.004203]  kmem_cache_alloc+0x47/0x760
[  337.004216]  ? find_held_lock+0x39/0x1d0
[  337.004238]  alloc_inode+0x128/0x180
[  337.004251]  new_inode_pseudo+0x69/0x190
[  337.004261]  ? prune_icache_sb+0x1a0/0x1a0
[  337.004269]  ? kernel_read+0x120/0x120
[  337.004283]  ? wait_for_completion+0x7b0/0x7b0
[  337.004304]  create_pipe_files+0x9a/0x940
[  337.004318]  ? fifo_open+0xa40/0xa40
[  337.004348]  __do_pipe_flags+0x35/0x220
[  337.004364]  SyS_pipe2+0x9b/0x2f0
[  337.004375]  ? do_pipe_flags+0x1a0/0x1a0
[  337.004382]  ? SyS_write+0x184/0x220
[  337.004390]  ? __do_page_fault+0x3d6/0xc90
[  337.004404]  ? SyS_read+0x220/0x220
[  337.004419]  ? do_fast_syscall_32+0x156/0xf9d
[  337.004435]  ? do_pipe_flags+0x1a0/0x1a0
[  337.004448]  do_fast_syscall_32+0x3ee/0xf9d
[  337.004470]  ? do_int80_syscall_32+0x9d0/0x9d0
[  337.004491]  ? lockdep_sys_exit+0x47/0xf0
[  337.004502]  ? syscall_return_slowpath+0x2ad/0x550
[  337.004520]  ? sysret32_from_system_call+0x5/0x3b
[  337.004540]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  337.004562]  entry_SYSENTER_compat+0x51/0x60
[  337.004568] RIP: 0023:0xf7f09c79
[  337.004573] RSP: 002b:00000000f770508c EFLAGS: 00000296 ORIG_RAX: 000000000000014b
[  337.004583] RAX: ffffffffffffffda RBX: 0000000020fb0ff8 RCX: 0000000000000000
[  337.004588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  337.004593] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  337.004598] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  337.004602] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  337.884583] CPU: 1 PID: 24652 Comm: syz-executor1 Not tainted 4.15.0-rc2+ #120
[  337.893743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  337.903063] Call Trace:
[  337.905623]  dump_stack+0x194/0x257
[  337.909229]  ? arch_local_irq_restore+0x53/0x53
[  337.913876]  should_fail+0x8c0/0xa40
[  337.917561]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  337.922636]  ? lock_page_memcg+0x2bd/0x3b0
[  337.926842]  ? find_held_lock+0x39/0x1d0
[  337.930880]  ? lock_downgrade+0x980/0x980
[  337.935018]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  337.940873]  ? rcu_note_context_switch+0x710/0x710
[  337.945776]  should_failslab+0xec/0x120
[  337.949719]  kmem_cache_alloc_node+0x56/0x760
[  337.954184]  ? reacquire_held_locks+0x201/0x3e0
[  337.958824]  copy_process.part.36+0x1a6a/0x4ae0
[  337.963459]  ? __lock_acquire+0x6e9/0x47f0
[  337.967671]  ? __cleanup_sighand+0x40/0x40
[  337.971879]  ? print_usage_bug+0x3f0/0x3f0
[  337.976079]  ? wake_up_page_bit+0x530/0x530
[  337.980717]  ? __lock_is_held+0xbc/0x140
[  337.984762]  ? __lock_acquire+0x6e9/0x47f0
[  337.988973]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  337.994138]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  337.999292]  ? get_mem_cgroup_from_mm+0x49b/0x710
[  338.004100]  ? check_noncircular+0x20/0x20
[  338.008301]  ? print_usage_bug+0x3f0/0x3f0
[  338.012503]  ? print_usage_bug+0x3f0/0x3f0
[  338.016706]  ? check_noncircular+0x20/0x20
[  338.020911]  ? lock_acquire+0x1d5/0x580
[  338.024851]  ? __fdget_pos+0x131/0x1a0
[  338.028708]  ? check_noncircular+0x20/0x20
[  338.032920]  ? lock_downgrade+0x980/0x980
[  338.037350]  ? check_noncircular+0x20/0x20
[  338.042716]  ? find_held_lock+0x39/0x1d0
[  338.046752]  ? check_noncircular+0x20/0x20
[  338.050961]  ? lock_downgrade+0x980/0x980
[  338.055076]  ? __lock_is_held+0xbc/0x140
[  338.059112]  ? find_held_lock+0x39/0x1d0
[  338.063149]  ? lock_downgrade+0x980/0x980
[  338.067264]  ? get_pid_task+0xbc/0x140
[  338.071120]  ? proc_fail_nth_write+0xb5/0x260
[  338.075583]  ? map_files_get_link+0x3a0/0x3a0
[  338.080041]  ? __lock_is_held+0xbc/0x140
[  338.084074]  _do_fork+0x1ef/0xff0
[  338.087499]  ? fork_idle+0x2d0/0x2d0
[  338.091446]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.096954]  ? kernel_read+0x120/0x120
[  338.100808]  ? wait_for_completion+0x7b0/0x7b0
[  338.105626]  ? __lock_is_held+0xbc/0x140
[  338.110884]  ? __sb_end_write+0x9e/0xd0
[  338.115437]  ? fput+0xd2/0x140
[  338.118610]  ? SyS_write+0x184/0x220
[  338.122290]  ? __do_page_fault+0x3d6/0xc90
[  338.126501]  ? SyS_read+0x220/0x220
[  338.130099]  SyS_clone+0x37/0x50
[  338.133433]  ? entry_INT80_compat+0x40/0x40
[  338.137725]  do_fast_syscall_32+0x3ee/0xf9d
[  338.142021]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.146575]  ? lockdep_sys_exit+0x47/0xf0
[  338.150689]  ? syscall_return_slowpath+0x2ad/0x550
[  338.155848]  ? sysret32_from_system_call+0x5/0x3b
[  338.160663]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.165477]  entry_SYSENTER_compat+0x51/0x60
[  338.169854] RIP: 0023:0xf7fd7c79
[  338.173184] RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.180859] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020fbf000
[  338.188096] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.195332] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
2017/12/06 19:32:04 executing program 1:
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f000069c000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:0):
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:04 executing program 2:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={<r0=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r1 = gettid()
r2 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r3=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r2, 0x8, r3)
getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0})
getpgrp(0x0)
getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:04 executing program 0 (fault-call:0 fault-nth:1):
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
2017/12/06 19:32:04 executing program 5:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x2, 0x80000, 0x0)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0)
accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000)
ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74)
fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0})
mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0)
open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0)
r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002)
syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800)
getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4)
setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8)
r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1)
setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0)
creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80)
request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0)
r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2)
getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8)
epoll_create1(0x80002)
syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1)
r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2)
pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49)
ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}})
2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:3):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:04 executing program 7:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:04 executing program 6:
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = gettid()
r1 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r2=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r1, 0x8, r2)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4)
fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, <r3=>0x0})
r4 = getpgrp(0x0)
getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10)
kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff)
kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"})
2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:1):
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
[  338.202569] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.209804] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.237837] FAULT_INJECTION: forcing a failure.
[  338.237837] name failslab, interval 1, probability 0, space 0, times 0
2017/12/06 19:32:04 executing program 1:
pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
r0 = getpgid(0x0)
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
timer_create(0x7, &(0x7f000094e000-0x58)={0x0, 0x2d, 0x1, @tid=r0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000000)=0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:4):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:2):
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:3):
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
[  338.245212] FAULT_INJECTION: forcing a failure.
[  338.245212] name failslab, interval 1, probability 0, space 0, times 0
[  338.245221] CPU: 1 PID: 24736 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120
[  338.245226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
2017/12/06 19:32:04 executing program 1:
pipe2(&(0x7f0000129000)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x80000)
clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00006ba000-0x4)=0x0, &(0x7f0000001000-0x4)=0x4)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
fcntl$setflags(r0, 0x2, 0x1)
2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:4):
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
inotify_init1(0x0)
kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:5):
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="")
mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0)
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
r0 = inotify_init1(0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={<r1=>0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc)
fcntl$setown(r0, 0x8, r1)
fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, <r2=>0x0})
r3 = getpgrp(0x0)
kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)
creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0)
2017/12/06 19:32:04 executing program 1:
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)="2f6465762f6375736500", 0x8000, 0x0)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000002000-0x4)=0x0, &(0x7f0000001000)=0x4)
ioctl$TIOCSTI(r0, 0x5412, 0x7)
setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000178000)=0x5, 0x4)
pipe2(&(0x7f0000fb1000-0x8)={<r1=>0xffffffffffffffff, 0xffffffffffffffff}, 0x0)
mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
sendmmsg$nfc_llcp(r1, &(0x7f0000000000)=[{&(0x7f0000003000-0x58)={0x27, 0x4, 0xfff, 0x2, 0x3, 0x2, "76f96e734651620ebcf9c9891ce24c9bc325ce618da8edb2975accf61d4181b053610786824f9589cf56bfb416300c49624670d1af4b4e6fcd7e84776c0d23", 0x100}, 0x58, &(0x7f0000003000-0x18)=[{&(0x7f0000000000)="182273e5a84f250dd22d17a7ebc5df68dabfbd1436becfc2795efa2875d1ff53cdd36c7a30f85153db2a31d65a2b084ba8ca2ab7338c3f02f7288226de3b951c62e71f1566d26d98f24be378bdccb1cb8b6f7ae01fa3f9863d2136b671fe41b691cde815e4cf5e980263f4a8bb6cbfdf35ee92303367bc", 0x77}, {&(0x7f0000002000-0xbd)="f0ae94c19d97bb33e748dbbb0d218997f9ad5604846d22e805c081d719d81bd3b6b37ea2918f7ddf0ba078836e866b911b58e3f5697e430f37be6be6581f43784709bce1d02cd7f91fc8568bd67bd30f87a5cf41fadaa6ec4b6c632f58d366da4129352d632fa639f2ab66a16b3c6957c618ebbf3fa45b7d1b29c2273b5209355627a2c9ebd6b65c581fb9ffb3a0674b694ec260661edab79c22bb268244457acb9c4d5b14cfb8c19ac629923cda7b278fcbacbffef0975d34c0e4901f", 0xbd}, {&(0x7f0000000000)="4ba73f7f22040475ad868231577e4cc52b0d593963a043", 0x17}], 0x3, &(0x7f0000003000-0x80)={0x80, 0x100, 0x3ff, "9ae309ad947b18b055deb4c67fb7d4c3c23ea8ba00ba50781ea388de08cd48ac5619ab293a84c72892e331e9a10309b6bcd2f4a3a66f9b665986e0bf7840a5ca7ccf9b2ed1b9097d59c158f3194c15e1a6d551cf89c5da8c2a66b8991a3ef46fe0596417acf26254b990b2ba02a569bcbce628"}, 0x80, 0x4000000}], 0x1, 0x80)
clone(0x2, &(0x7f0000001000-0x1)="a9", &(0x7f0000744000)=0x0, &(0x7f0000c96000-0x4)=0x0, &(0x7f0000804000)="")
execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[])
[  338.245229] Call Trace:
[  338.245241]  dump_stack+0x194/0x257
[  338.245254]  ? arch_local_irq_restore+0x53/0x53
[  338.245267]  ? lock_downgrade+0x980/0x980
[  338.245288]  should_fail+0x8c0/0xa40
[  338.245297]  ? __fdget+0x20/0x20
[  338.245310]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.245335]  ? find_held_lock+0x39/0x1d0
[  338.245360]  ? lock_downgrade+0x980/0x980
[  338.245392]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.245407]  ? rcu_note_context_switch+0x710/0x710
[  338.245414]  ? unwind_get_return_address+0x61/0xa0
[  338.245435]  should_failslab+0xec/0x120
[  338.245447]  kmem_cache_alloc_trace+0x4b/0x750
[  338.245454]  ? SyS_unshare+0xfa0/0xfa0
[  338.245466]  ? save_stack+0xa3/0xd0
[  338.245486]  do_execveat_common.isra.30+0x3ea/0x23c0
[  338.245493]  ? do_fast_syscall_32+0x3ee/0xf9d
[  338.245500]  ? entry_SYSENTER_compat+0x51/0x60
[  338.245527]  ? prepare_bprm_creds+0x110/0x110
[  338.245535]  ? check_stack_object+0x68/0x140
[  338.245551]  ? __check_object_size+0x25d/0x4f0
[  338.245576]  ? do_raw_spin_trylock+0x190/0x190
[  338.245591]  ? rcu_pm_notify+0xc0/0xc0
[  338.245614]  ? strncpy_from_user+0x323/0x430
[  338.245631]  ? mpi_resize+0x200/0x200
[  338.245657]  ? getname_flags+0x256/0x580
[  338.245677]  compat_SyS_execve+0x3f/0x50
[  338.245688]  ? SyS_execveat+0x60/0x60
[  338.245696]  do_fast_syscall_32+0x3ee/0xf9d
[  338.245716]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.245731]  ? trace_event_raw_event_sys_exit+0x260/0x260
[  338.245744]  ? lockdep_sys_exit+0x47/0xf0
[  338.245754]  ? syscall_return_slowpath+0x2ad/0x550
[  338.245769]  ? sysret32_from_system_call+0x5/0x3b
[  338.245786]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.245806]  entry_SYSENTER_compat+0x51/0x60
[  338.245813] RIP: 0023:0xf7f66c79
[  338.245817] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b
[  338.245825] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8
[  338.245830] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000
[  338.245834] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.245838] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.245842] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.253109] FAULT_INJECTION: forcing a failure.
[  338.253109] name failslab, interval 1, probability 0, space 0, times 0
[  338.253120] CPU: 0 PID: 24739 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.253125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.253128] Call Trace:
[  338.253141]  dump_stack+0x194/0x257
[  338.253155]  ? arch_local_irq_restore+0x53/0x53
[  338.253184]  should_fail+0x8c0/0xa40
[  338.253199]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.253215]  ? lock_page_memcg+0x2bd/0x3b0
[  338.253235]  ? find_held_lock+0x39/0x1d0
[  338.253265]  ? lock_downgrade+0x980/0x980
[  338.253301]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.253317]  ? rcu_note_context_switch+0x710/0x710
[  338.253341]  should_failslab+0xec/0x120
[  338.253354]  kmem_cache_alloc_node+0x56/0x760
[  338.253371]  ? reacquire_held_locks+0x201/0x3e0
[  338.253392]  copy_process.part.36+0x1a6a/0x4ae0
[  338.253405]  ? __lock_acquire+0x6e9/0x47f0
[  338.253434]  ? __cleanup_sighand+0x40/0x40
[  338.253458]  ? print_usage_bug+0x3f0/0x3f0
[  338.253467]  ? wake_up_page_bit+0x530/0x530
[  338.253490]  ? update_cfs_rq_load_avg.part.70+0x2d0/0x2d0
[  338.253526]  ? __lock_acquire+0x6e9/0x47f0
[  338.253556]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.253581]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.253594]  ? check_noncircular+0x20/0x20
[  338.253612]  ? print_usage_bug+0x3f0/0x3f0
[  338.253626]  ? check_noncircular+0x20/0x20
[  338.253645]  ? lock_acquire+0x1d5/0x580
[  338.253656]  ? __fdget_pos+0x131/0x1a0
[  338.253674]  ? check_noncircular+0x20/0x20
[  338.253702]  ? lock_downgrade+0x980/0x980
[  338.253714]  ? check_noncircular+0x20/0x20
[  338.253739]  ? find_held_lock+0x39/0x1d0
[  338.253751]  ? check_noncircular+0x20/0x20
[  338.253775]  ? lock_downgrade+0x980/0x980
[  338.253785]  ? __lock_is_held+0xbc/0x140
[  338.253816]  ? find_held_lock+0x39/0x1d0
[  338.253846]  ? lock_downgrade+0x980/0x980
[  338.253858]  ? get_pid_task+0xbc/0x140
[  338.253872]  ? proc_fail_nth_write+0xb5/0x260
[  338.253884]  ? map_files_get_link+0x3a0/0x3a0
[  338.253891]  ? __lock_is_held+0xbc/0x140
[  338.253911]  _do_fork+0x1ef/0xff0
[  338.253932]  ? fork_idle+0x2d0/0x2d0
[  338.253950]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.253961]  ? kernel_read+0x120/0x120
[  338.253974]  ? wait_for_completion+0x7b0/0x7b0
[  338.253993]  ? __lock_is_held+0xbc/0x140
[  338.254030]  ? __sb_end_write+0x9e/0xd0
[  338.254048]  ? fput+0xd2/0x140
[  338.254059]  ? SyS_write+0x184/0x220
[  338.254066]  ? __schedule+0x2060/0x2060
[  338.254080]  ? SyS_read+0x220/0x220
[  338.254105]  SyS_clone+0x37/0x50
[  338.254117]  ? entry_INT80_compat+0x40/0x40
[  338.254132]  do_fast_syscall_32+0x3ee/0xf9d
[  338.254152]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.254165]  ? trace_event_raw_event_sys_exit+0x260/0x260
[  338.254177]  ? lockdep_sys_exit+0x47/0xf0
[  338.254188]  ? syscall_return_slowpath+0x2ad/0x550
[  338.254204]  ? sysret32_from_system_call+0x5/0x3b
[  338.254223]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.254246]  entry_SYSENTER_compat+0x51/0x60
[  338.254253] RIP: 0023:0xf7f06c79
[  338.254258] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.254267] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.254272] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.254277] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.254282] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.254286] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.275682] FAULT_INJECTION: forcing a failure.
[  338.275682] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  338.275700] CPU: 1 PID: 24754 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.275704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.275707] Call Trace:
[  338.275719]  dump_stack+0x194/0x257
[  338.275732]  ? arch_local_irq_restore+0x53/0x53
[  338.275758]  should_fail+0x8c0/0xa40
[  338.275772]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.275796]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.275809]  ? __lock_acquire+0x6e9/0x47f0
[  338.275835]  ? __lock_acquire+0x6e9/0x47f0
[  338.275859]  ? check_noncircular+0x20/0x20
[  338.275867]  ? lock_pin_lock+0x370/0x370
[  338.275880]  ? should_fail+0x23b/0xa40
[  338.275903]  __alloc_pages_nodemask+0x338/0xd80
[  338.275914]  ? lock_page_memcg+0x2bd/0x3b0
[  338.275934]  ? __alloc_pages_slowpath+0x2d00/0x2d00
[  338.275941]  ? find_held_lock+0x39/0x1d0
[  338.275968]  ? lock_downgrade+0x980/0x980
[  338.276009]  ? rcu_note_context_switch+0x710/0x710
[  338.276026]  cache_grow_begin+0x72/0x3f0
[  338.276043]  kmem_cache_alloc_node+0x443/0x760
[  338.276072]  copy_process.part.36+0x1a6a/0x4ae0
[  338.276084]  ? __lock_acquire+0x6e9/0x47f0
[  338.276110]  ? __cleanup_sighand+0x40/0x40
[  338.276132]  ? print_usage_bug+0x3f0/0x3f0
[  338.276139]  ? wake_up_page_bit+0x530/0x530
[  338.276152]  ? __lock_is_held+0xbc/0x140
[  338.276189]  ? __lock_acquire+0x6e9/0x47f0
[  338.276213]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.276236]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.276244]  ? get_mem_cgroup_from_mm+0x49b/0x710
[  338.276253]  ? check_noncircular+0x20/0x20
[  338.276263]  ? print_usage_bug+0x3f0/0x3f0
[  338.276274]  ? print_usage_bug+0x3f0/0x3f0
[  338.276287]  ? check_noncircular+0x20/0x20
[  338.276304]  ? lock_acquire+0x1d5/0x580
[  338.276313]  ? __fdget_pos+0x131/0x1a0
[  338.276329]  ? check_noncircular+0x20/0x20
[  338.276353]  ? lock_downgrade+0x980/0x980
[  338.276363]  ? check_noncircular+0x20/0x20
[  338.276385]  ? find_held_lock+0x39/0x1d0
[  338.276395]  ? check_noncircular+0x20/0x20
[  338.276416]  ? lock_downgrade+0x980/0x980
[  338.276424]  ? __lock_is_held+0xbc/0x140
[  338.276451]  ? find_held_lock+0x39/0x1d0
[  338.276478]  ? lock_downgrade+0x980/0x980
[  338.276489]  ? get_pid_task+0xbc/0x140
[  338.276500]  ? proc_fail_nth_write+0xb5/0x260
[  338.276511]  ? map_files_get_link+0x3a0/0x3a0
[  338.276518]  ? __lock_is_held+0xbc/0x140
[  338.276536]  _do_fork+0x1ef/0xff0
[  338.276555]  ? fork_idle+0x2d0/0x2d0
[  338.276571]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.276580]  ? kernel_read+0x120/0x120
[  338.276592]  ? wait_for_completion+0x7b0/0x7b0
[  338.276613]  ? __lock_is_held+0xbc/0x140
[  338.276647]  ? __sb_end_write+0x9e/0xd0
[  338.276663]  ? fput+0xd2/0x140
[  338.276672]  ? SyS_write+0x184/0x220
[  338.276681]  ? __do_page_fault+0x3d6/0xc90
[  338.276695]  ? SyS_read+0x220/0x220
[  338.276713]  SyS_clone+0x37/0x50
[  338.276724]  ? entry_INT80_compat+0x40/0x40
[  338.276737]  do_fast_syscall_32+0x3ee/0xf9d
[  338.276757]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.276776]  ? lockdep_sys_exit+0x47/0xf0
[  338.276786]  ? syscall_return_slowpath+0x2ad/0x550
[  338.276800]  ? sysret32_from_system_call+0x5/0x3b
[  338.276817]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.276837]  entry_SYSENTER_compat+0x51/0x60
[  338.276843] RIP: 0023:0xf7f06c79
[  338.276847] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.276855] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.276860] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.276864] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.276868] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.276872] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.301690] FAULT_INJECTION: forcing a failure.
[  338.301690] name failslab, interval 1, probability 0, space 0, times 0
[  338.301702] CPU: 1 PID: 24763 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.301707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.301711] Call Trace:
[  338.301723]  dump_stack+0x194/0x257
[  338.301738]  ? arch_local_irq_restore+0x53/0x53
[  338.301767]  should_fail+0x8c0/0xa40
[  338.301783]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.301798]  ? depot_save_stack+0x12c/0x490
[  338.301820]  ? find_held_lock+0x39/0x1d0
[  338.301848]  ? lock_downgrade+0x980/0x980
[  338.301885]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.301902]  ? rcu_note_context_switch+0x710/0x710
[  338.301929]  should_failslab+0xec/0x120
[  338.301943]  __kmalloc_track_caller+0x5f/0x760
[  338.301949]  ? rcu_pm_notify+0xc0/0xc0
[  338.301966]  ? prepare_creds+0x78/0x360
[  338.301973]  ? selinux_cred_prepare+0x43/0xa0
[  338.301992]  kmemdup+0x24/0x50
[  338.302009]  selinux_cred_prepare+0x43/0xa0
[  338.302023]  security_prepare_creds+0x7d/0xb0
[  338.302040]  prepare_creds+0x2b1/0x360
[  338.302050]  ? abort_creds+0x130/0x130
[  338.302064]  ? trace_hardirqs_on_caller+0x421/0x5c0
[  338.302071]  ? __lockdep_init_map+0xe4/0x650
[  338.302090]  copy_creds+0x7b/0x3a0
[  338.302108]  copy_process.part.36+0xb28/0x4ae0
[  338.302119]  ? __lock_acquire+0x6e9/0x47f0
[  338.302140]  ? __cleanup_sighand+0x40/0x40
[  338.302159]  ? print_usage_bug+0x3f0/0x3f0
[  338.302166]  ? wake_up_page_bit+0x530/0x530
[  338.302179]  ? __lock_is_held+0xbc/0x140
[  338.302215]  ? __lock_acquire+0x6e9/0x47f0
[  338.302239]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.302261]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.302269]  ? get_mem_cgroup_from_mm+0x49b/0x710
[  338.302278]  ? check_noncircular+0x20/0x20
[  338.302288]  ? print_usage_bug+0x3f0/0x3f0
[  338.302299]  ? print_usage_bug+0x3f0/0x3f0
[  338.302312]  ? check_noncircular+0x20/0x20
[  338.302328]  ? lock_acquire+0x1d5/0x580
[  338.302337]  ? __fdget_pos+0x131/0x1a0
[  338.302352]  ? check_noncircular+0x20/0x20
[  338.302377]  ? lock_downgrade+0x980/0x980
[  338.302387]  ? check_noncircular+0x20/0x20
[  338.302409]  ? find_held_lock+0x39/0x1d0
[  338.302419]  ? check_noncircular+0x20/0x20
[  338.302440]  ? lock_downgrade+0x980/0x980
[  338.302449]  ? __lock_is_held+0xbc/0x140
[  338.302476]  ? find_held_lock+0x39/0x1d0
[  338.302502]  ? lock_downgrade+0x980/0x980
[  338.302512]  ? get_pid_task+0xbc/0x140
[  338.302525]  ? proc_fail_nth_write+0xb5/0x260
[  338.302535]  ? map_files_get_link+0x3a0/0x3a0
[  338.302542]  ? __lock_is_held+0xbc/0x140
[  338.302560]  _do_fork+0x1ef/0xff0
[  338.302578]  ? fork_idle+0x2d0/0x2d0
[  338.302600]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.302611]  ? kernel_read+0x120/0x120
[  338.302623]  ? wait_for_completion+0x7b0/0x7b0
[  338.302642]  ? __lock_is_held+0xbc/0x140
[  338.302677]  ? __sb_end_write+0x9e/0xd0
[  338.302694]  ? fput+0xd2/0x140
[  338.302705]  ? SyS_write+0x184/0x220
[  338.302714]  ? __do_page_fault+0x3d6/0xc90
[  338.302727]  ? SyS_read+0x220/0x220
[  338.302746]  SyS_clone+0x37/0x50
[  338.302755]  ? entry_INT80_compat+0x40/0x40
[  338.302767]  do_fast_syscall_32+0x3ee/0xf9d
[  338.302787]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.302805]  ? lockdep_sys_exit+0x47/0xf0
[  338.302815]  ? syscall_return_slowpath+0x2ad/0x550
[  338.302829]  ? sysret32_from_system_call+0x5/0x3b
[  338.302847]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.302866]  entry_SYSENTER_compat+0x51/0x60
[  338.302872] RIP: 0023:0xf7f06c79
[  338.302876] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.302884] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.302889] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.302893] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.302897] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.302901] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.319866] FAULT_INJECTION: forcing a failure.
[  338.319866] name failslab, interval 1, probability 0, space 0, times 0
[  338.319881] CPU: 1 PID: 24765 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120
[  338.319886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.319889] Call Trace:
[  338.319901]  dump_stack+0x194/0x257
[  338.319915]  ? arch_local_irq_restore+0x53/0x53
[  338.319923]  ? __might_sleep+0x95/0x190
[  338.319948]  should_fail+0x8c0/0xa40
[  338.319962]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.319973]  ? mutex_lock_io_nested+0x1900/0x1900
[  338.319984]  ? __save_stack_trace+0x7e/0xd0
[  338.320009]  ? find_held_lock+0x39/0x1d0
[  338.320040]  ? __lock_is_held+0xbc/0x140
[  338.320072]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.320087]  ? rcu_note_context_switch+0x710/0x710
[  338.320112]  should_failslab+0xec/0x120
[  338.320125]  kmem_cache_alloc+0x47/0x760
[  338.320137]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.320147]  ? rcu_pm_notify+0xc0/0xc0
[  338.320164]  prepare_creds+0x78/0x360
[  338.320174]  ? abort_creds+0x130/0x130
[  338.320187]  ? do_execveat_common.isra.30+0x3ea/0x23c0
[  338.320198]  ? rcu_read_lock_sched_held+0x108/0x120
[  338.320209]  ? kmem_cache_alloc_trace+0x459/0x750
[  338.320218]  ? SyS_unshare+0xfa0/0xfa0
[  338.320235]  prepare_exec_creds+0x11/0xf0
[  338.320248]  prepare_bprm_creds+0x67/0x110
[  338.320262]  do_execveat_common.isra.30+0x40a/0x23c0
[  338.320270]  ? do_fast_syscall_32+0x3ee/0xf9d
[  338.320278]  ? entry_SYSENTER_compat+0x51/0x60
[  338.320307]  ? prepare_bprm_creds+0x110/0x110
[  338.320317]  ? check_stack_object+0x68/0x140
[  338.320335]  ? __check_object_size+0x25d/0x4f0
[  338.320363]  ? do_raw_spin_trylock+0x190/0x190
[  338.320381]  ? rcu_pm_notify+0xc0/0xc0
[  338.320400]  ? strncpy_from_user+0x323/0x430
[  338.320421]  ? mpi_resize+0x200/0x200
[  338.320452]  ? getname_flags+0x256/0x580
[  338.320476]  compat_SyS_execve+0x3f/0x50
[  338.320488]  ? SyS_execveat+0x60/0x60
[  338.320498]  do_fast_syscall_32+0x3ee/0xf9d
[  338.320521]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.320543]  ? lockdep_sys_exit+0x47/0xf0
[  338.320554]  ? syscall_return_slowpath+0x2ad/0x550
[  338.320571]  ? sysret32_from_system_call+0x5/0x3b
[  338.320591]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.320620]  entry_SYSENTER_compat+0x51/0x60
[  338.320627] RIP: 0023:0xf7f66c79
[  338.320632] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b
[  338.320642] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8
[  338.320647] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000
[  338.320652] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.320657] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.320662] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.325209] FAULT_INJECTION: forcing a failure.
[  338.325209] name failslab, interval 1, probability 0, space 0, times 0
[  338.325217] CPU: 0 PID: 24770 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.325221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.325224] Call Trace:
[  338.325233]  dump_stack+0x194/0x257
[  338.325247]  ? arch_local_irq_restore+0x53/0x53
[  338.325272]  should_fail+0x8c0/0xa40
[  338.325289]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.325301]  ? depot_save_stack+0x12c/0x490
[  338.325320]  ? find_held_lock+0x39/0x1d0
[  338.325346]  ? lock_downgrade+0x980/0x980
[  338.325379]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.325393]  ? rcu_note_context_switch+0x710/0x710
[  338.325417]  should_failslab+0xec/0x120
[  338.325428]  __kmalloc_track_caller+0x5f/0x760
[  338.325434]  ? rcu_pm_notify+0xc0/0xc0
[  338.325449]  ? prepare_creds+0x78/0x360
[  338.325456]  ? selinux_cred_prepare+0x43/0xa0
[  338.325473]  kmemdup+0x24/0x50
[  338.325485]  selinux_cred_prepare+0x43/0xa0
[  338.325497]  security_prepare_creds+0x7d/0xb0
[  338.325512]  prepare_creds+0x2b1/0x360
[  338.325522]  ? abort_creds+0x130/0x130
[  338.325534]  ? trace_hardirqs_on_caller+0x421/0x5c0
[  338.325541]  ? __lockdep_init_map+0xe4/0x650
[  338.325558]  copy_creds+0x7b/0x3a0
[  338.325576]  copy_process.part.36+0xb28/0x4ae0
[  338.325587]  ? __lock_acquire+0x6e9/0x47f0
[  338.325613]  ? __cleanup_sighand+0x40/0x40
[  338.325635]  ? print_usage_bug+0x3f0/0x3f0
[  338.325641]  ? wake_up_page_bit+0x530/0x530
[  338.325654]  ? __lock_is_held+0xbc/0x140
[  338.325692]  ? __lock_acquire+0x6e9/0x47f0
[  338.325716]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.325738]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.325746]  ? get_mem_cgroup_from_mm+0x49b/0x710
[  338.325755]  ? check_noncircular+0x20/0x20
[  338.325765]  ? print_usage_bug+0x3f0/0x3f0
[  338.325776]  ? print_usage_bug+0x3f0/0x3f0
[  338.325789]  ? check_noncircular+0x20/0x20
[  338.325805]  ? lock_acquire+0x1d5/0x580
[  338.325814]  ? __fdget_pos+0x131/0x1a0
[  338.325829]  ? check_noncircular+0x20/0x20
[  338.325854]  ? lock_downgrade+0x980/0x980
[  338.325864]  ? check_noncircular+0x20/0x20
[  338.325885]  ? find_held_lock+0x39/0x1d0
[  338.325896]  ? check_noncircular+0x20/0x20
[  338.325916]  ? lock_downgrade+0x980/0x980
[  338.325925]  ? __lock_is_held+0xbc/0x140
[  338.325951]  ? find_held_lock+0x39/0x1d0
[  338.325977]  ? lock_downgrade+0x980/0x980
[  338.325988]  ? get_pid_task+0xbc/0x140
[  338.325999]  ? proc_fail_nth_write+0xb5/0x260
[  338.326010]  ? map_files_get_link+0x3a0/0x3a0
[  338.326016]  ? __lock_is_held+0xbc/0x140
[  338.326034]  _do_fork+0x1ef/0xff0
[  338.326053]  ? fork_idle+0x2d0/0x2d0
[  338.326068]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.326078]  ? kernel_read+0x120/0x120
[  338.326089]  ? wait_for_completion+0x7b0/0x7b0
[  338.326111]  ? __lock_is_held+0xbc/0x140
[  338.326144]  ? __sb_end_write+0x9e/0xd0
[  338.326160]  ? fput+0xd2/0x140
[  338.326170]  ? SyS_write+0x184/0x220
[  338.326178]  ? __do_page_fault+0x3d6/0xc90
[  338.326190]  ? SyS_read+0x220/0x220
[  338.326209]  SyS_clone+0x37/0x50
[  338.326218]  ? entry_INT80_compat+0x40/0x40
[  338.326230]  do_fast_syscall_32+0x3ee/0xf9d
[  338.326249]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.326267]  ? lockdep_sys_exit+0x47/0xf0
[  338.326277]  ? syscall_return_slowpath+0x2ad/0x550
[  338.326291]  ? sysret32_from_system_call+0x5/0x3b
[  338.326308]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.326328]  entry_SYSENTER_compat+0x51/0x60
[  338.326334] RIP: 0023:0xf7f06c79
[  338.326338] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.326346] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.326350] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.326354] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.326359] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.326363] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.358131] FAULT_INJECTION: forcing a failure.
[  338.358131] name failslab, interval 1, probability 0, space 0, times 0
[  338.358141] CPU: 0 PID: 24783 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.358146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.358149] Call Trace:
[  338.358161]  dump_stack+0x194/0x257
[  338.358176]  ? arch_local_irq_restore+0x53/0x53
[  338.358186]  ? __save_stack_trace+0x7e/0xd0
[  338.358214]  should_fail+0x8c0/0xa40
[  338.358231]  ? fault_create_debugfs_attr+0x1f0/0x1f0
[  338.358247]  ? find_held_lock+0x39/0x1d0
[  338.358265]  ? find_held_lock+0x39/0x1d0
[  338.358295]  ? lock_downgrade+0x980/0x980
[  338.358332]  ? trace_event_raw_event_sched_switch+0x800/0x800
[  338.358348]  ? rcu_note_context_switch+0x710/0x710
[  338.358358]  ? kvm_clock_get_cycles+0x25/0x30
[  338.358377]  should_failslab+0xec/0x120
[  338.358390]  kmem_cache_alloc_trace+0x4b/0x750
[  338.358399]  ? trace_hardirqs_on_caller+0x421/0x5c0
[  338.358406]  ? __lockdep_init_map+0xe4/0x650
[  338.358419]  ? __lockdep_init_map+0xe4/0x650
[  338.358437]  lockdep_init_task+0x187/0x210
[  338.358450]  copy_process.part.36+0x16eb/0x4ae0
[  338.358487]  ? __cleanup_sighand+0x40/0x40
[  338.358512]  ? print_usage_bug+0x3f0/0x3f0
[  338.358520]  ? wake_up_page_bit+0x530/0x530
[  338.358535]  ? __lock_is_held+0xbc/0x140
[  338.358578]  ? __lock_acquire+0x6e9/0x47f0
[  338.358605]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.358631]  ? debug_check_no_locks_freed+0x3d0/0x3d0
[  338.358640]  ? get_mem_cgroup_from_mm+0x49b/0x710
[  338.358651]  ? check_noncircular+0x20/0x20
[  338.358662]  ? print_usage_bug+0x3f0/0x3f0
[  338.358674]  ? print_usage_bug+0x3f0/0x3f0
[  338.358689]  ? check_noncircular+0x20/0x20
[  338.358707]  ? lock_acquire+0x1d5/0x580
[  338.358717]  ? __fdget_pos+0x131/0x1a0
[  338.358730]  ? check_noncircular+0x20/0x20
[  338.358753]  ? lock_downgrade+0x980/0x980
[  338.358763]  ? check_noncircular+0x20/0x20
[  338.358786]  ? find_held_lock+0x39/0x1d0
[  338.358796]  ? check_noncircular+0x20/0x20
[  338.358817]  ? lock_downgrade+0x980/0x980
[  338.358826]  ? __lock_is_held+0xbc/0x140
[  338.358853]  ? find_held_lock+0x39/0x1d0
[  338.358882]  ? lock_downgrade+0x980/0x980
[  338.358895]  ? get_pid_task+0xbc/0x140
[  338.358908]  ? proc_fail_nth_write+0xb5/0x260
[  338.358920]  ? map_files_get_link+0x3a0/0x3a0
[  338.358927]  ? __lock_is_held+0xbc/0x140
[  338.358949]  _do_fork+0x1ef/0xff0
[  338.358970]  ? fork_idle+0x2d0/0x2d0
[  338.358988]  ? __mutex_unlock_slowpath+0xe9/0xac0
[  338.358999]  ? kernel_read+0x120/0x120
[  338.359017]  ? wait_for_completion+0x7b0/0x7b0
[  338.359038]  ? __lock_is_held+0xbc/0x140
[  338.359075]  ? __sb_end_write+0x9e/0xd0
[  338.359096]  ? fput+0xd2/0x140
[  338.359107]  ? SyS_write+0x184/0x220
[  338.359117]  ? __do_page_fault+0x3d6/0xc90
[  338.359132]  ? SyS_read+0x220/0x220
[  338.359152]  SyS_clone+0x37/0x50
[  338.359162]  ? entry_INT80_compat+0x40/0x40
[  338.359177]  do_fast_syscall_32+0x3ee/0xf9d
[  338.359201]  ? do_int80_syscall_32+0x9d0/0x9d0
[  338.359220]  ? lockdep_sys_exit+0x47/0xf0
[  338.359233]  ? syscall_return_slowpath+0x2ad/0x550
[  338.359250]  ? sysret32_from_system_call+0x5/0x3b
[  338.359269]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  338.359289]  entry_SYSENTER_compat+0x51/0x60
[  338.359296] RIP: 0023:0xf7f06c79
[  338.359300] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.359308] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.359313] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.359318] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.359322] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.359327] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.377507] kasan: CONFIG_KASAN_INLINE enabled
[  338.377510] kasan: GPF could be caused by NULL-ptr deref or user memory access
[  338.377518] general protection fault: 0000 [#1] SMP KASAN
[  338.377523] Dumping ftrace buffer:
[  338.377527]    (ftrace buffer empty)
[  338.377529] Modules linked in:
[  338.377538] CPU: 1 PID: 24788 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120
[  338.377541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  338.377550] RIP: 0010:lockdep_invariant_state+0xd6/0x120
[  338.377554] RSP: 0018:ffff8801c406fe48 EFLAGS: 00010002
[  338.377559] RAX: dffffc0000000000 RBX: 0000000000001d88 RCX: ffffffff81008dab
[  338.377563] RDX: 00000000000003bc RSI: 0000000000000000 RDI: 0000000000001de0
[  338.377567] RBP: ffff8801c406fe58 R08: 1ffffffff0d2abdb R09: 0000000000000000
[  338.377571] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.377575] R13: ffff8801c406ff20 R14: ffff8801c406ff58 R15: ffff8801d81b6300
[  338.377581] FS:  0000000000000000(0000) GS:ffff8801db500000(0063) knlGS:00000000f7702b40
[  338.377585] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  338.377589] CR2: 0000000020c08000 CR3: 00000001c891a000 CR4: 00000000001406e0
[  338.377600] DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000020000000
[  338.377604] DR3: 0000000020001000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  338.377606] Call Trace:
[  338.377615]  lockdep_sys_exit+0x47/0xf0
[  338.377624]  syscall_return_slowpath+0x240/0x550
[  338.377635]  ? prepare_exit_to_usermode+0x340/0x340
[  338.377645]  ? copy_overflow+0x20/0x20
[  338.377663]  ret_from_fork+0x15/0x30
[  338.377668] RIP: 0023:0xf7f06c79
[  338.377671] RSP: 002b:0000000020fbf000 EFLAGS: 00000296 ORIG_RAX: 0000000000000078
[  338.377678] RAX: 0000000000000000 RBX: 0000000000000200 RCX: 0000000020fbf000
[  338.377682] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000
[  338.377686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[  338.377689] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[  338.377693] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  338.377708] Code: 83 90 11 00 00 83 e0 3f 48 89 c2 48 c1 e2 04 48 29 c2 48 b8 00 00 00 00 00 fc ff df 49 8d 1c d4 48 8d 7b 58 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2f 48 c7 43 58 00 00 00 00 5b 41 5c 5d c3 0f ff 
[  338.377819] RIP: lockdep_invariant_state+0xd6/0x120 RSP: ffff8801c406fe48
[  338.377826] ---[ end trace 7b017090a1c310d0 ]---
[  338.377830] Kernel panic - not syncing: Fatal exception
[  338.378539] Dumping ftrace buffer:
[  338.378541]    (ftrace buffer empty)
[  338.378544] Kernel Offset: disabled
[  340.909533] Rebooting in 86400 seconds..