ffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) r6 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4") perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, &(0x7f0000aa5000)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x2}, 0x1, 0x0, "69643000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "74696d6572310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x0, 0x80000000, 0x1, 0x3a, 0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) chdir(&(0x7f0000f51000)="2e2f66696c653000") 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:52 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) bind(r0, &(0x7f0000503000-0x3)=@nfc={0x27, 0x80000001, 0x1ff, 0x2}, 0x10) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000a6a000-0x4)=0xb414, 0x4) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:52 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"}) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x3dd, 0x3, &(0x7f0000477000)=[{&(0x7f0000b90000-0x80)="870a09a08ea07ac1849c92a8afa308e8dc3cd95afee668f7a0796be82d82211dc273eb0fe5858c34588f8b56d341122a5b4b567f9bf3db4a1910331bca0acfa21ec531b745efc1e5b1edf12219b558bde9d5e92ac5994f5a877fad7bf43064f7aaf80b973c133afddbc44429a7ead3f8776f103f432bc4733e380e0e49611e76", 0x80, 0x80, 0x200}, {&(0x7f0000705000)="9747eee6b93d022a1ac7e8706c0403e9a7f280c75f63f20195d9648c125c36c2596e7cd0dae4b00f7653e4b7f0b9526f801c26dc872c218552477a66b0f900fe77a05e5a54902bcca6a42702840063064fc541015d19bea6aefa6e27efb7895157d751c6b7d8cb2487d7bee73c1edb4ca9f3922e29ec94ae64d6721038ebed251dca8eb137a15ea376047ff117192da6de0db535734b2e3377e7ea25d6985916967775479a", 0xa5, 0xd08, 0x5}, {&(0x7f00008d0000)="3ee28a375ddbeaae39d9f91a1fe2b70b6fea18d416a8a4e1351a9885c62d0d640164cb69b0ab9de8c8b1afba58d118d4c7500b16b047f1a744f4482e939d080ec20e9fd4988f8318aff66d1382aec1a057fe97e3dd3222e602f8b40bb6bb03c145e967f172cd44be5325151b7228e7f54ce5e0b3ff4d7d1515090797163f49f392943bb8f63f17c43e06d6cf82d881082b8f44d4e2203426913303499702be9427af42413b315e2ab6961b0ad3772e9a6e10354faa6d3068bc9aabb8922b4306c4decb86e3cc59780941d2ee83c193dfc0b30294371f8542d7fc67450ca51632d8a2e711bd1b9e", 0xe7, 0x1, 0x1f}], 0x30002) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000d66000-0x4)=0xe8) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(r0, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000501000-0x30)={0x5, [0x4, 0xffff, 0x2, 0x0, 0x7cac]}) gettid() ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) dup(r2) 2017/12/06 19:31:52 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000444000-0x10)={0x0, 0x0, @rand_addr=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000153000)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000a34000-0x4)=0x3, 0x4) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) r6 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4") perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, &(0x7f0000aa5000)={{0xffffffffffffffff, 0x1, 0x1, 0x2, 0x2}, 0x1, 0x0, "69643000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", "74696d6572310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x0, 0x80000000, 0x1, 0x3a, 0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:52 executing program 5: add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x5, 0x2, 0x4000000000, 0x0, 0x40, 0x0, 0x0, 0x2, 0x0, 0x1000000000002, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) set_robust_list(&(0x7f0000aba000-0xc)={&(0x7f0000cc4000/0x1000)=nil, 0x3, &(0x7f0000c67000/0x3000)=nil}, 0xc) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00003cd000)={0x0, 0x0}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwrite64(r0, &(0x7f0000254000)="e4d1112a0a5aea21758c841947da4203bd31caa34a02585e8e322e0b8a60b1c48209910c6735c48bbd5236ca4b387dbcfc9752ca0929ab9e632ea03e0d8a9bd7918c6fa50eb336808d9f7ff31935620527b7d4541f6b9bbd13cb79c1ef155f49c000", 0x62, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x11, 0x400000000d, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714001000000000000009d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x1, 0x40000]}) 2017/12/06 19:31:52 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r2, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:52 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:52 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000d39000-0x4)=0x0, 0x4) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) fcntl$setlease(r0, 0x400, 0x2) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) r6 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4") perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00006dc000)="2f6465762f696e7075742f6d69636500", 0x0, 0x82) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:52 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f00004e5000-0x8)="2e2f66696c653000", 0x203e, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:52 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) setuid(r1) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socket$kcm(0x29, 0x2, 0x0) gettid() ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:52 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:52 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:52 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) openat$ptmx(0xffffffffffffff9c, &(0x7f00004e7000)="2f6465762f70746d7800", 0x181a00, 0x0) openat(r0, &(0x7f000085c000)="2e2f66696c653000", 0x80000, 0x14) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) connect$netlink(r0, &(0x7f00009ba000)={0x2, 0x0, 0x1, 0x7ff}, 0xc) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r0, 0x400, 0x2) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x5, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) rmdir(&(0x7f0000f1a000-0x8)="2e2f66696c653000") 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) r6 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4") perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f000093b000-0x16)="656d30e45e7d2d5d6d643573756d70707031656d3100", 0x0) r0 = open(&(0x7f0000854000-0x8)="2e2f66696c653000", 0x202, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000816000)=0x0, &(0x7f0000e98000-0x4)=0x4) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f000015b000)=[], 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x10040, 0x3, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) ioctl$TIOCSTI(r0, 0x5412, 0x2) sched_yield() 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000bc9000-0x4)=0x0, &(0x7f0000430000)=0x4) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f0000be7000)={0x5, 0xeb0e, 0x8000, 0x4}) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) mlockall(0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000457000)={0x0, 0x0}) getpriority(0x1, r3) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) r6 = gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) ptrace$setregs(0xf, r6, 0xfffffffffffffffd, &(0x7f00000d1000-0x67)="5e089d1c0608a3d54a2c93525dabf134ef30b87f4d68ae222a696e6f07fb27f1a31de35dbceee99c9ac36b926068f7b604044b4b94f52473dd8544ab2db4afd418c1d99356df9db9e908def97ffecc68355909b3dd4c12692e44ea3de533b1860363784bd758d4") getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="69645f6c656761637900", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="00", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000c4f000)="68696768737065656400", 0xa) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) syz_open_dev$vcsn(&(0x7f0000484000-0xa)="2f6465762f7663732300", 0xb3, 0x400) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000e82000)=[{&(0x7f000070b000)="c2b8", 0x2}, {&(0x7f000059c000-0x20)="304c6451c0432edf2d9ab5d85670df1468f28a13edcc53c843ba621e7acda747616c4cff99938a97b5f5bc6ba2bbc1dc0413d26e00e62f6dced0abf12cb3b4c2312f6dcb423e122956ad3ea92fe71edfba5876f4e4d898a4", 0x58}, {&(0x7f0000d82000-0x79)="6382e613600d2b07f73af0980a76fcb4c5847747eb488c4eafc1a872315113e6b7ebdf42a445ae1c61b3afcc124213be0cd314d831ab741ff6dc0ae517959f919df7cd838db6850c82f69de3c7cab65610a2514e1f979e5dd009a8082d35d87e5dcea7d013e89373d421f4084ecb898637acd9d6d2de64f3af", 0x79}], 0x3, 0xc9) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) epoll_create(0x5) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) renameat2(r0, &(0x7f0000a86000)="2e2f66696c653000", r0, &(0x7f0000f44000)="2e2f66696c653000", 0x2) uselib(&(0x7f00001b7000)="2e2f66696c653000") gettid() ioctl$KDGKBENT(r0, 0x4b46, &(0x7f00009ba000)={0x7, 0x7, 0x81}) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000a1000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000612000)=0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x6, 0x2, &(0x7f0000141000)={0x0, 0x0}) setsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000380000)=0x5, 0x4) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00007b0000)="2f6465762f73657175656e6365723200", 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000018000-0x50)={0x2, 0x1, 0x4, 0x0, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00004d5000)=0x0) sched_getattr(r1, &(0x7f0000476000-0x30)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x30, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f00008a9000)=0x100000001, 0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000aa9000-0x4)=0x0, &(0x7f0000f48000-0x4)=0x4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) rename(&(0x7f0000860000)="2e2f66696c653000", &(0x7f0000d0a000-0x8)="2e2f66696c653000") 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$inet_dccp_int(r2, 0x21, 0x3, &(0x7f00007b8000-0x4)=0x0, &(0x7f0000056000-0x4)=0x4) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$bt_rfcomm(r2, &(0x7f000065c000)={0x1f, {0x3ff, 0x7f, 0x4, 0xfff, 0x7f, 0x0}, 0x4}, 0x9) bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) gettid() perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) sync_file_range(r0, 0xffffffffffffff7f, 0x8000, 0x5) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) [ 327.282753] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r0, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000aaa000)="2f6465762f696e7075742f6d6f7573652300", 0x1000, 0x101000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000dd6000)={{0x10, 0x3}, {0x80, 0x8}, 0xbc8, 0x1, 0xff, [0x0, 0x0, 0x0], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) [ 327.385694] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) ioctl$TIOCGPTPEER(r3, 0x5441, 0x7ffffffd) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x5, 0x4, 0x20) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f00001af000)={0x0, 0x0, 0x0}, 0xc) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000fcc000)={0x9, 0x800, 0x6, 0x1, 0x6, 0x0}) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000c3000)=0x9, 0x4) ioprio_get$uid(0x3, r1) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1e, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x0]}) [ 327.457540] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000fb2000-0x5)={0x73, 0x79, 0x7a, 0x1, 0x0}, &(0x7f0000b97000)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) io_setup(0xb0, &(0x7f00001f9000)=0x0) io_destroy(r2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) signalfd4(r5, &(0x7f0000998000)={0x9}, 0x8, 0x80800) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000570000)="") gettid() ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(r1, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) [ 327.546784] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:53 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000f4d000)="646e735f7265736f6c76657200", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000964000-0x4)=0x0, &(0x7f00003e7000-0x4)=0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000846000-0x8)=0x2) 2017/12/06 19:31:53 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x5, 0x4, 0x20) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f00001af000)={0x0, 0x0, 0x0}, 0xc) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000fcc000)={0x9, 0x800, 0x6, 0x1, 0x6, 0x0}) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000c3000)=0x9, 0x4) ioprio_get$uid(0x3, r1) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:53 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) getsockopt$inet_int(r0, 0x0, 0x7, &(0x7f000095e000)=0x0, &(0x7f00004ef000-0x4)=0x4) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="6c6f8800", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) r0 = add_key(&(0x7f0000bb9000-0xb)="706b6373375f7465737400", &(0x7f000014f000)={0x73, 0x79, 0x7a, 0x3, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000dbf000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00007fd000)="262f2973656c696e75782900", r0) r1 = open(&(0x7f0000563000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x1f, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:53 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xb5, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:53 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="", 0x0}], 0x1, 0x49) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:53 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00005be000-0x8)=0x3000) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) stat(&(0x7f00001cf000)="2e2f66696c653000", &(0x7f00009b2000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000cf3000)={{{@in=@broadcast=0x0, @in=@remote={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@loopback=0x0, 0x0, 0x0}, 0x0, @in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f00008d2000)=0xe8) setresuid(r2, r3, r4) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) rt_sigprocmask(0x2, &(0x7f0000b37000)={0x7ff}, &(0x7f0000060000-0x8)={0x0}, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 4: request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000c5e000-0x8)={0x7f, 0xffffffffffff7fff}) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x5b, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f000008e000-0xe0)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="00", 0x1, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000689000+0x84b)=@req3={0x6, 0x2f8, 0x8, 0x3, 0x6, 0x6, 0x1}, 0x1c) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000277000-0x1ba)="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", 0x1ba}], 0x1, 0x4c) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r0, r4, &(0x7f000018e000-0x8)=0xffffffffffffffff, 0xffffffff) gettid() bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000338000)="2f6465762f696e7075742f6d6f7573652300", 0x3, 0x402240) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f00002e4000-0xa7)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", &(0x7f000007a000-0x4)=0xa7) r2 = syz_open_dev$loop(&(0x7f00006e0000)="2f6465762f6c6f6f702300", 0x77f, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000019d000)={0x9, 0x7, 0x8000}, 0x4) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x4, 0x0, 0x1, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc00c64b5, &(0x7f0000820000)={&(0x7f0000e86000-0x14)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x63) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x10202) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000dc8000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000674000)={{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {0x7, @random="15b3a0910cb7", [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x70, {0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic="bd493027c1267f949d5630c57f23b862"}) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000534000)={{{{0x2, 0x3, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {{0xa, 0x2, 0x1, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2, 0xff, 0x0, "fd69d9047658835fccf80ce3c759b809d8e28ff37381ecfc6faee9c7eab79ade5d9b91411a2aee2cac3e9e81c11f2ca0aad60f322380cba2b7c2c945907c91848064c240b3af0df69b317bf2d5769b2d"}, 0x160) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000662000)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded0080500000097a7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bfba9df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, &(0x7f00003db000-0x8)=0x0, 0x100000001) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000510000-0x4)=0x7) gettid() bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$kvm(0xffffffffffffff9c, &(0x7f00005b4000-0x9)="2f6465762f6b766d00", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(r0, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) madvise(&(0x7f0000941000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00004c6000)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xffffffffffffeffd, 0x1, 0x0, 0x40000000000000, 0xe, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) r3 = syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000f07000-0x30)={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) [ 328.162666] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) syz_open_dev$mouse(&(0x7f0000fa3000)="2f6465762f696e7075742f6d6f7573652300", 0x3f, 0x80) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000ae9000-0x4)=0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x1, 0xffff) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000d4f000-0x12)={@generic="48be52e78480e4561c75b8ed8a45e242", 0x2}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) [ 328.218721] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00006fe000-0x78)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbmon(&(0x7f00006ba000-0xd)="2f6465762f7573626d6f6e2300", 0x3, 0x0) dup2(r4, r3) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x1, 0xc, 0x664, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7f, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x4, 0x0}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f000066f000-0x8)="2e2f66696c653000", 0x8000, 0x20) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r3 = getpgrp(0x0) fcntl$setown(r1, 0x8, r3) readahead(r0, 0xe6, 0x24d9) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) r2 = dup2(r0, r0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f000030d000-0x14)={0xffffffff7fffffff, 0x2, 0x4, 0x1, 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00003d8000)={0x5, 0x9, 0x8, 0x2, 0xa8e, 0x401, 0x7}, 0xc) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r6 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r4, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, r8) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f000003a000-0xbc)={0xf6, 0x4, "636c69656e7431000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6, "3f487f8bb9ab153c", "217ee6778202a3821459e5acf6de8931dcf8ea4d808a1cd07f82190154e5adeb", 0xb7, 0xfd2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000cb9000)=@rc={0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0}, &(0x7f0000f8c000-0x4)=0x9, 0x800) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000fb6000)=@assoc_id=0x0, &(0x7f0000bb4000)=0x4) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000dc3000-0x4)=r1, 0x4) socket(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000e1e000)={r1, @in6={{0xa, 0x1, 0x8, @loopback={0x0, 0x1}, 0x40}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5, 0x3}, 0x98) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x10000000010, 0x2, 0xc) write(r4, &(0x7f00004b1000)="1f0000000104ff00fd434514234d0000000000000800010001ffdcffdf000d", 0x1f) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000b39000)={0xf37, 0x1, 0x1, 0x7fff, 0x0}, &(0x7f0000f97000)=0x10) write(r4, &(0x7f00008f0000)="1f0000000104ff080471cf000000000000d100000b00020000000900001200", 0x1f) r6 = gettid() r7 = creat(&(0x7f0000c55000-0x8)="2e2f66696c653000", 0x4) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f000035c000)=r5, 0x4) setsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000de7000)=@assoc_value={r5, 0x4}, 0x8) pwrite64(r7, &(0x7f0000499000)="a9c69d7a865e2b53d9b1b452e56c18a1cf4867bea62774c39cbcb7241d74084d15f4cce8606467af7ea8ad52e27f02780970252db8ed8876a93e61def63369628cfbd0756e5fce", 0x47, 0x0) timerfd_settime(r7, 0x1, &(0x7f000061e000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000429000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f00005fb000-0x4d)="") r8 = memfd_create(&(0x7f0000e55000)="00", 0x3) mq_timedsend(r8, &(0x7f0000a73000-0xfe)="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", 0xfe, 0x1ff, &(0x7f000027a000)={0x0, 0x989680}) kcmp(r6, r6, 0x2, r4, r3) ioctl$EVIOCGKEY(r8, 0x80404518, &(0x7f00005f3000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r7, 0x84, 0x7, &(0x7f000093a000)={0x2}, 0x4) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) dup2(r0, r0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:54 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) [ 328.518871] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000a8c000-0xb5)="", 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) bind$llc(0xffffffffffffffff, &(0x7f00001e2000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r5 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r3, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r5, r6, r7) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xc0, &(0x7f000058e000-0x12)="000000000000000000000000000000000000", &(0x7f00001b1000)=0x12) 2017/12/06 19:31:54 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000e54000-0x4)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) [ 328.565706] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. [ 328.579191] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:54 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f000079c000-0x18)={0x6001, &(0x7f0000b06000-0x5)=0x0, 0x8, r0, 0x0}) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:54 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18) 2017/12/06 19:31:54 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) [ 328.644707] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. 2017/12/06 19:31:54 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r4 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r4, r5, r6) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:54 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0106434, &(0x7f00007c3000-0x10)={0x7, 0x0, 0x3, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40086437, &(0x7f0000783000)={r3, 0x3}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18) 2017/12/06 19:31:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) setsockopt(r0, 0x103, 0x1, &(0x7f0000c0b000-0xc4)="44adbd7611c73f1731005691f9224f880b23d8a894439e7ce28959b7d4dd1fdd700af60e967175f3b5d0870a1896d2cc1b5b7b47ad660c2a3f1ae19ada365db21dae8446e840cba44ad9e7d7874f4f5f7886f5e115203935660432984cfc5bd4652969c8e9a21ed72e4b24cf75fcc32410198e99e4d24b0d9470443855532d802b7b4f8b12cd3c6e5420ff14ced929835a11b3ee66adb2559297d64312692e4e949a9cea4e7e4de608000bbe268f5d804e5c0040d77466ce8c19568ccee7317ed4fba7aa", 0xc4) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0) accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74) fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0) open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002) syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8) r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0) creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r3 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008e3000-0x8)="2e2f66696c653000", &(0x7f0000964000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, r5) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000025b000)={0x0, 0x0}, &(0x7f00006fb000)=0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0186404, &(0x7f0000e82000)={&(0x7f0000a6a000/0x1000)=nil, 0x16a3dadb, 0x1, 0x8, &(0x7f00003df000/0x4000)=nil, 0x7}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00006a9000)={r3, &(0x7f0000947000)="b9c520fe01237d5703ad3f958f6a6977fa2da22ba6fc6bb33d29d8b473ef009c516ce9004e5e70f4608d15c509ffd0dd6db25c323c507f20b79ec4e061096dab5f2d7f37bc2680545e0e24d5026fbfbb54117025693c5fc0828e10e397cc6295683b8a3148e5504a43d393f8c29acc728ddd8a58d7f5a3b2a63c286bea9588f6cb1c2ee668f03b9486e2b7d7b9ea4ddfabaf9b48307d27b9749e1ec3e173e24d338a9c1469cb5e144add7a", &(0x7f00000e6000-0xeb)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, 0x18) [ 328.850448] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r3 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, 0x0) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00006a1000+0x34c)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f000019e000-0x8)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000eb1000-0x8)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000a08000-0x8)={r4, r5}) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() getsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f00006f1000-0x4)=0x0, &(0x7f0000b2c000)=0x4) bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) rt_sigpending(&(0x7f0000fe9000-0x8)={0x0}, 0x8) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f000069c000)=0xff, 0x4) 2017/12/06 19:31:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x520) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00002a6000)={r1, 0x401}, &(0x7f000051d000-0x4)=0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000412000)={@common="74756e6c300000000000000000000000", @ifru_ivalue=0x0}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800003, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000cb1000)={0x0, 0xa4, "592d170ba3671899254fad333c39b11ddae7d0f893aa9fd47b06b6438732abe1bd108f4ce64878d24073dd417df0ea30ceb18c63b8eca8918fd2c27b21942a0c50f24a81a765e35afc9d2b1ca24300048e35bf90a4174975dc072152707899c0c816d26564710332cda2bc5189b04e6aeee4a1beb95f7eaebbdeb603e757b3b30f92f7f75af46cf528a17d23dc6929e1372be1e5a679cd031835e6a1d3a7359e5340e4a0"}, &(0x7f000080b000)=0xac) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) r2 = request_key(&(0x7f00002c3000)="69645f6c656761637900", &(0x7f000096f000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002c2000-0x8)="5c73797374656d00", 0xfffffffffffffffb) keyctl$chown(0x4, r2, 0x0, 0x0) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r2, 0x26) setfsgid(r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000d67000-0x8)={0x0, 0x8}, &(0x7f000095c000-0x4)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000bb2000)=@sack_info={r3, 0x1, 0x100000000}, &(0x7f0000c28000)=0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00003a0000-0x8)={0x0, 0x1ff}, 0x8) fcntl$getflags(r0, 0xb) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000f00000)={&(0x7f0000e47000-0x10)=[0x8, 0x4, 0x3, 0x20], 0x4, 0x3, 0x80000000, 0x0, 0x5, 0x8001, {0x0, 0x0, 0x1, 0xbbe, 0x4, 0x8001, 0x8, 0xffff, 0x9e, 0x8, 0x0, 0x5, 0x7, 0x80, "5dedbc1aabcf81bf7bf11b1ab11401e8a800f847e72a7b95cf188e5e02760b0b"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000d1f000)=0x0) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000df8000-0xc)={0x0, 0x0, 0x0}, 0xc) syz_open_procfs(r6, &(0x7f0000dad000)="6e65742f64657600") setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000dee000-0x4)=0x8, 0x4) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f000023c000-0x5)={0x0, 0x0, 0x0, 0x0}, &(0x7f00009b1000)=0x5) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800003, 0x84) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) [ 329.084194] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) tkill(r1, 0x26) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r0, &(0x7f0000f41000-0x8)=0x0, 0x100000001) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000903000-0x18)={0x4ac4, 0x3, 0x4, 0xffffffffffffffe0, 0x1, 0x62e1}) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000ecb000)={0x0, 0x0, 0x0}, 0xc) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) [ 329.147845] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) lstat(&(0x7f000030d000)="2e2f66696c653000", &(0x7f000051b000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000438000-0x4)={0x8}, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) fremovexattr(r0, &(0x7f000036b000-0xd)=@random={"6f73782e00", "5c73797374656d00"}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) [ 329.281962] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000e0a000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_addrs={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000509000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) readahead(r0, 0x5, 0x460) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) [ 329.335636] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000fc5000)=@in6={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f000043c000-0x4)=0x1c, 0x80000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) getpeername$packet(r1, &(0x7f0000f4a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, &(0x7f0000c3b000)=0x14) stat(&(0x7f00006d9000-0x8)="2e2f66696c653000", &(0x7f0000169000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000d3a000)={{{@in6=@loopback={0x0, 0x1}, @in=@multicast2=0xe0000002, 0x1, 0x2b, 0x3, 0x7f, 0x10, 0xa0, 0xa0, 0x8, r3, r4}, {0x0, 0x5e2, 0x80000000, 0x6, 0x8, 0x6, 0xca9, 0x774}, {0x100000000, 0x1, 0x5, 0x1}, 0x6, 0x81, 0x2d, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x6d92, 0x1, 0x3}, 0x3, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x87, 0x2, 0x0, 0x2, 0x8, 0xffffffff, 0x0}}, 0xe8) r5 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) fstat(0xffffffffffffffff, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r2, 0x0) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) [ 329.479268] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r4 = dup(r2) r5 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000485000-0x18)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0xffff, r3}) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(r5, r6, &(0x7f00000de000-0x8)=0x0, 0x100000001) io_setup(0x4, &(0x7f0000870000)=0x0) io_cancel(r7, &(0x7f0000b1d000)={0x0, 0x0, 0x0, 0x0, 0x4682, r0, &(0x7f0000b6c000)="bd95f07435d1b316e08a3f34eb0f692ffd3d94", 0x13, 0x0, 0x0, 0x0, r4}, &(0x7f0000ece000-0x20)={0x0, 0x0, 0x0, 0x0}) gettid() bind$llc(r6, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00006bc000-0x4)=0x0, &(0x7f0000c8d000-0x4)=0x4) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x4800, 0x0) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000c87000-0x8)="2e2f66696c653000", 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f000064f000)={0x0, 0x0}, &(0x7f0000e38000-0x4)=0x8) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) [ 329.564528] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000b6d000)="2f6465762f73657175656e63657200", 0x0, 0x0) 2017/12/06 19:31:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r0, &(0x7f0000f41000-0x8)=0x0, 0x100000001) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000903000-0x18)={0x4ac4, 0x3, 0x4, 0xffffffffffffffe0, 0x1, 0x62e1}) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r4 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r5 = gettid() pread64(r1, &(0x7f0000261000-0x89)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x89, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00001e8000)={0x5, [0xff, 0x1, 0x100, 0x8, 0x129]}, &(0x7f0000fec000)=0xe) ptrace$peekuser(0x3, r5, 0x800) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r6) sendfile(r4, r6, &(0x7f00000de000-0x8)=0x0, 0x100000001) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000c59000)=@assoc_value={0x0, 0x0}, &(0x7f00003ae000-0x4)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00009d4000)={0x800, 0x4, 0xc70, 0xffffffffffffffe0, r7}, &(0x7f0000c32000)=0x10) ioctl$sock_ipx_SIOCIPXCFGDATA(r6, 0x89e2, &(0x7f00007c1000)={0x0, 0x0}) ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x3) init_module(&(0x7f0000d38000)="00", 0x1, &(0x7f0000aee000-0xd)="646e735f7265736f6c76657200") gettid() bind$llc(r6, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) personality(0x6000003) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:55 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00003d5000-0x8)={0x0, 0x0}) prctl$setptracer(0x59616d61, r2) syz_open_dev$random(&(0x7f0000b55000-0xc)="2f6465762f72616e646f6d00", 0x0, 0x2000) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) [ 329.726820] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) setpgid(r0, r1) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r2, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r3, 0x0) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x0, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000cc0000)="2e2f66696c653000", 0x0, 0x1) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000bf8000)={@generic="6d3916c7c9abe801634e38cd02235594", 0x500000}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) r0 = add_key(&(0x7f000085c000-0x5)="6365706800", &(0x7f00009f5000)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00006b8000)="73432046647044be0f9e5dae841ab29415e32fb0590d902d30dda2887f2ab5239f4d5a338da5f44b320e75138815d5402479cc5fe48aef348fba8992374f36ad23a6f37268443235bc510e06f87d4e8428d71f410216a2ec7dc7", 0x5a, 0xffffffffffffffff) request_key(&(0x7f0000292000-0x12)="2e726571756573745f6b65795f6175746800", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", r0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() r4 = openat(r3, &(0x7f000001d000)="2e2f66696c653000", 0x80040, 0x10) renameat2(r4, &(0x7f00008cc000-0x8)="2e2f66696c653000", r3, &(0x7f0000f9d000-0x8)="2e2f66696c653000", 0x2) bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c035397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x200000008]}) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0x0, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="000000000000000000000000000000", 0xf, 0x3) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000173000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005af000)=0xc) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x21, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x0]}) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="", 0x0, 0x3) [ 329.895173] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) gettid() r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r3 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) r5 = epoll_create1(0x80002) r6 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r7 = getpid() fstat(r5, &(0x7f0000efe000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f000014a000-0x1)=0x0) getsockopt$SO_PEERCRED(r2, 0x1, 0x11, &(0x7f0000f16000)={0x0, 0x0, 0x0}, 0xc) fstat(r0, &(0x7f00003bb000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000cde000)={&(0x7f0000540000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000956000)=[{&(0x7f0000a28000-0x12)="77dc240d990c5f0801186a5000953314a32f", 0x12}, {&(0x7f0000d51000-0x3f)="cf2a803bb99d79d0ef5140a8d089857bb65bccc3a2415ddb37dd1cdd76695f8103867f210f9bf7992e4f0b69d13521a624f191688f17f466180676d85b085d", 0x3f}, {&(0x7f00005fc000)="32a716b51fc8e6eb534711c1a66e21e15a987948e5f8587789be84a7d22f041b51fe4a9e0cace33dd5058374432794cb79f4395a7ded152c0a9af14b654b51ece06ac7184dbfe65d3316148aaccf8ff65288692e77a638d33e2646dd3da97aab424be0d0043028fe4a9557a4a0fbac790a4707331ea23bddef676c85c6d4c43ad570655cbb94cb0ff7e6c67e838fe4319da51dd344e0b74cc958338c67261a830e3b339d207c45ddda30a3f1aa75f8c2125af08e0c584cffcfbf570b7ff2bdab0b85ef069a9545951f74ea1e2593", 0xce}, {&(0x7f00005ea000-0x4)="579fbed7", 0x4}], 0x4, &(0x7f0000d22000-0xb8)=[@rights={0x10, 0x1, 0x1, [r6]}, @rights={0x18, 0x1, 0x1, [r2, r1, r0]}, @cred={0x18, 0x1, 0x2, r7, r4, r8}, @rights={0x18, 0x1, 0x1, [r5, r1, r5]}, @rights={0x24, 0x1, 0x1, [r6, r0, r2, r1, r3, r2]}, @rights={0x24, 0x1, 0x1, [r1, r2, r2, r1, r6, r5]}, @cred={0x18, 0x1, 0x2, r9, r10, r11}], 0xb8, 0x20000000}, 0x881) r12 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r12, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r12) sendfile(r6, r12, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r12, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00003f8000)=[{&(0x7f0000ffe000-0xa7)="8b78ca015e9840b899fd20d75b7fc77d80548dda3f89a812d7b43b3fc6300da26748f56521d103d3634e9aab5608d9d73b203f6e72829c80f53bb34219d939be5844b65ae65e5df197649f23ddd1d6c90cd9100531d7bfbc31e108b067b4f6db32cc189789000664de7ea818b3163bf85fb38cbdd562fd9793114e5d4ab3fed7e020899559dcd5a27fd5dd1d363f087c68fbf32a26aa6e34ccba540380ea0d74e953f08475cada", 0xa7}, {&(0x7f00005a9000)="13a5fe3e6749b764224c6504a16f5ae6c46f5e52ae608b544e107a9a224bf61c0535497dd12e9d97bcf43d933af29abda1fa3534debc6405466b6e9f66b89e94f90bbb8b7456ea3f616ec72081b2e8fc9a267be364bef9c91e2cf9973d509aa41dde6c010b961649a6e17d47c9743a9dd04507789f3ed54f7b5adc4060edba9e69c160a411e50542c6dff69bc24fa6373cdc20ea17f7b1216d67", 0x9a}, {&(0x7f0000ca5000-0x76)="875204f2679ae49efa8d80929623f8d5e868758c0aa829d2143d531384b247f7863237b94037b6fd3831f8de54cc5d8380d3d0ec2bad72abde732ed4ccc202e1ff70bcced0cce893af6f18510ea7be1944588862d9fb941983fcabff196fdfd8a1a5bb1ccdd4c0f884b7ffb7771cf767838bb97e2865", 0x76}], 0x3, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="0000000000000000", 0x8, 0x3) [ 329.949842] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="00", 0x1, 0x3) 2017/12/06 19:31:56 executing program 6: r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) [ 330.031664] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00005f2000)=[{&(0x7f0000ea6000)="72d3dc88c1d835511f8b8b8c20e1438a769f3abb129c095b55b4b5ba37b058ec99d94694cd31c5ac55fcc2d3bd81e928266335bcbd0f3e33804ddbc51dbb4d11b696fe38716c158ca5aa6e5a9625e933c75cfe6f9ff8d2e869e273b3970eb360a0a22388495dff96f4c526772150af09cac32172281ffca1de17579294e48e26d09f400d2b2b0e281c686d6afa8f6b319c43363b46198fb7fa5355b0e6f5e19882695cbc502ac7bff20e2894d49f01369dd8ce3b055b2def78b48c5aab0c0d6b1be42e7bf423107f041bba392f15128626cef10d61b0b5adcb9ceb1b22943ce901c6f042b8dde1211f468d9780eee9e56c49f88a1bdd", 0xf6}, {&(0x7f0000bd3000)="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", 0x1000}, {&(0x7f00006d2000)="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", 0x1000}], 0x3, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="", 0x0, 0x3) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) [ 330.097938] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) recvmsg(r0, &(0x7f0000c88000)={&(0x7f0000d67000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, 0x14, &(0x7f0000fb3000-0x8)=[{&(0x7f0000a42000-0x81)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x81}], 0x1, 0x0, 0x0, 0x10000}, 0x102) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x6b3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000558000-0xf)="00", 0x1, 0x0) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) 2017/12/06 19:31:56 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000380000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000c85000-0x60)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$KDSETLED(r1, 0x4b32, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r1, 0x0) [ 330.205836] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) [ 330.243683] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000418000)={0x1, 0x7, 0x2, 0x7}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x0) fstat(r0, &(0x7f00000e8000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) [ 330.296974] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 7: pipe2(&(0x7f0000d3f000)={0x0, 0x0}, 0x80800) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f000057d000)={{0xa, 0x1, 0x40, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x0}, {0xa, 0x2, 0x200, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x2}, 0x4, [0x1ff, 0x7a80d523, 0x5, 0x80000001, 0x0, 0x7, 0x0, 0x4]}, 0x5c) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006f8000)="2f6465762f72666b696c6c00", 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000bfc000-0x4)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, &(0x7f00008cd000-0xe7)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xe7) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000204000)={@generic="cc07cf51c43ba9b05aa1931cb5a9070c", @ifru_addrs={0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) r3 = socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000550000)=0x6ca, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000ed6000-0xc)={0x0, 0x0, 0x0}, &(0x7f00005bd000)=0xc) sendmsg$kcm(r0, &(0x7f000028e000-0x1c)={&(0x7f0000f74000)=@un=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f0000c56000-0x20)=[{&(0x7f000009b000-0x48)="e396681a3ceb1a125f521eac302864aaa07678eef48d65b413ebc0e7bcac4758a47b22751588ac413e39f6bfe17dda995d1be3e8e1fd60250a2b0ccbccca8bd4beb7861f6154006f", 0x48}, {&(0x7f00003d8000-0xba)="06eb2bb6cab0047e86f082bf29a09a25f1de81d29577a5aadf8cfcaa07fdc86edf4517ae51f2342f9767e5a6f33d61954d79043d076813fe30ad222ec975cb490cff5ee25e9d88a7a9d217572e1a7d177f4752f6857968d433a6d18db393a77748772f8802a8ad6e8080dd82058e7b8cdf2104f9f3a4c92154ec2659032d6f5aa162f9774abe0ed6e17899fc5e99bf74514aae027f029cca435df79c6250ff09d86283eb460a68b57bde6338c47c2f2f65849b2edd8f005ab004", 0xba}, {&(0x7f0000897000)="57f00039e1863419e38587b5bf966432aef703d08ce9b4b12cc9691c8db7cb3689a737f74d794472dbe5f2cb7c54edd7e0e0006e70a1e98f66d0e9bcdd6d1555fd4b16926345ffea666f7911481f9597a2e5f437f05e1d336529e235f5ed6ecc2b7179214db077e99c0e206d7b8dd962a87bae7dfd91dc7e54594c5a523e53e22c0ff48ef7dc3dfdb84ad42c356ad39750dc50221e084de2493cefcc00352786db7473e608ee535127581427de0460a42bc18d6896718a539f508c8e3bbbd6833d9b30f72c", 0xc5}, {&(0x7f00002ef000-0x1000)="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", 0x1000}], 0x4, &(0x7f0000cb5000-0xa8)=[{0xa8, 0x1ff, 0x0, "cd3e60f2184a1117f5006e3c61b632d64772327d5d6f460fe7ab0e384036d2c31a4edf689da786e771cc0bcb1c8660022c89042c01f59caf3c2f2b15bcc544c8a5737c3fd6b8dfe0ec567f2ab51b443240584f630254828a732fd6b85df4bacfad685fe73510beaf4003cc01c9613a15e5a8a173cd3a0a79459648cb2883affdeeac44201f657e6fe202fb78cbdecb3f7ffef7eba144de3949283717"}], 0xa8, 0x20000000}, 0x0) r5 = getgid() fstat(r2, &(0x7f0000fe0000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x3, &(0x7f00006e8000)=[r4, r5, r6]) r7 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r8 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r9 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f0000582000)=[{&(0x7f0000f4f000-0x1000)="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", 0x1000}, {&(0x7f0000545000)="9bf0a9bbf23d12612c4560792847d26a3fa69de934f3cbc75bdf2b4556cc4f0cae78ecca8a207cc9afc19ddc71d65265b6da7fc44a9b154657f046dbfdbb63c2a21aec2f8a346ac412b3c7bae017ba1071567fa7e3ea389553b24ea256", 0x5d}, {&(0x7f0000fd8000-0xce)="2651996d779b75531754d836adda3302d8d8aacf5e8aad577cb28b056b021aead42785737dcc5b2dbb1f7b822e0c45c37a8feb7c0b28e2109207f774d902c4d85a76570464cfc404c3c0c939e04f584ea25ae65ad5cf0c952bcd55c90ce1f58092391c1e5c79da045968b28ec29f48fc808668a19be2cc09f79a96de45c1b2f40fe027d6abe448e16b4ebb10d01279b992a046eb92c5c6125e291c30d7bb6ce04046ab9338f1d5f3b340302b0b0223da911682fe1c2145cb3b1bad436a2db21b11ac2f9f9b7cd6ae9b55e0e32d94", 0xce}, {&(0x7f0000f9c000-0x92)="608c9e5f2d3f36432598e7f5ff07cdc3f018bc75ce7bbbbeb49e76b348761c5373b3af693d08f310b07e7ebd3caae61bbad3333c2644a32680238f365f0dbab0912453b95a3cff6eec9b9509e667497a1a5117743179336483ac55cea39e0f87761ef87a6f2df57e9f6d9e946b39d8e730388b0e4ba7e56ff60801441c14440fdbeac00b30727bbfd057d8f30f3d146131183de16324c163e68e664903e40e21ac9d96dd1909d284ef29f44531a41bfca7c03ee1f9f6c65331aa81128fc92e38702ffeae3df035e0eb17d7467f3daeb117", 0xd1}, {&(0x7f00006e9000-0x9e)="58666ed6cfd33b9d95e2a398b299d5362d61a68a2b1ca9e3116d390e260ff6febc1803b4114b9c568dbd17fd737b17721816e270380cb0015fbacfd9f8071ca01d19aed0677ae4e45566bef482e3195aa54831a585887d80b814299285da5d4f571c67f12f75ae769afe7992f393afd4f91059c17f89836052c2302a318f6425c61b5953817d8fd10a97f371ecdcf6079e998459d709d39a2ae6b25a86e7", 0x9e}, {&(0x7f00004f8000-0x78)="56716e3ae3862e65a8e4373e61d62796b682bbab513ed86009a929990359b1cbba0d73ecdf6fba93ee2a2d6600783a7189578bed08ca51fd948b019035ec6ed41d20262489d1d1e8f16aa056f682db89e7ce93073434c16e0729153043657aa065978480248d738f67ce26bf94d8f8a7f2ed2fb4789a3c0c", 0x78}], 0x6, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r9, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(r1, r1, &(0x7f00000de000-0x8)=0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000e13000)={0x0, 0x1ff, 0x2, 0x800}, &(0x7f00003c5000-0x4)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00005a3000-0x18)={r10, 0x1000, 0x30, 0x2, 0x5}, &(0x7f0000e6e000)=0x18) ioctl$LOOP_SET_STATUS64(r8, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) pwritev(r7, &(0x7f00007bb000)=[{&(0x7f0000335000)="34568533d7ce24c4c74d39d39c6528c69da9e9c03b705243444ee8d4fc152d3e458e1c7ae699c4f410bfda", 0x2b}, {&(0x7f000000f000)="d5ff760d09c62afa64a3578d5920633f8ce5deeafda3f3b4314deb345b1a985f743c7cb3ec71ee780609e2cd3fbcac2246042b9662403510f17341956d2dda18c1742ac62d8461b2de5d5a3c1b796dfe", 0x50}, {&(0x7f0000891000-0xae)="3bf44487a27a24f15f033ee14b8d11a1e701c7489c4eb75846540b2676d9b10d4f5c1f40030d939e44a9b2155f6dce0f13193eb12b27ab7dfc8878c176ad9ed3647e9dee5a0728a61a676daf92976f5fdae8c988ed44ec391f23df084af47994ed8ed37c80ff9ff4c82044f4f42daac55d6dc6ccb6ae9bf1d0f1f7084f3f9d333ebe6959d74e489b7eef26655c875cf7653301b416150898f04434b6d142374ae1f68f0fb282c8a910af6afab215", 0xae}, {&(0x7f0000b3a000-0x58)="ae59b093f4e1de28990f59ea8347f85accd296cf8d896bb6142ec16b279e96b9375e1d9c59fb8b3698da78eea5a08fcce46c6fdde96287fb68e0761e337d74617f1c9603b65fc2f0fcba919ce06f85c409c9db07f659", 0x56}, {&(0x7f0000f94000)="5d05974c1bea7a703a005e6fa4cb7d1840b2359c2213a1e327821f25dcbb695fc72074140e83036f73eced2b4e77146af1b118aaae899ce8c85d26742917de3732e866e757b8cb55ec4e4f669ac3438de3a8dd25fa6beca62c20681f3209ce36d801cd3308bfc9e10985c07f2a7aa8dda147dd2e7ee365d13be9ff0f192561", 0x7f}, {&(0x7f00004d8000-0xff)="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", 0xff}, {&(0x7f000068c000)="b1969ee37da3fe25c1884ea5fd95aa267a9d91d9a7a402e928cba36e506c902d0dec236007f4f5de036ecbe7baa0f08bdbea17ddeae49b6522b928d3d421ef43b29a08ac5490add462d1f92655ce21273c7747e3621931a202e4956cb48ba3ad76b82f1e2dc0c1fbbb0b2c720a4a181e2a94ad6150c87a878ab1d843e7d5c5e14ee629e5452d840d0c0a93ae72f5731e010405", 0x93}, {&(0x7f0000b56000-0xa2)="05a7579bc0b0d62645902c39894de314ef07ece435b8976fe3bafaf8852d49cf3387e879259dfb87d49a6dacfe4c0a614e10f6fdff237f798292bc76dbe4692757217f755327f50a95a77f2b859a05bc0a1b19a91f24e779ecc8d5d696e02c0debf01de4d5bcdc68e4934105a2a98598a7761d134863353bb926c0b5c1b5d6e78ba8df06715381f975e138551c3587aac74ec50f5af798b0962d1f2d2e3ecdf7ab36", 0xa2}, {&(0x7f0000fd5000-0x75)="4b5b159186c785e24350380c38a55dd843c2b32d0d8bf72ef961b32663ccb72849b745031cc354b8593716de1dd94d9b5842d295408f433027aefcac1fa131d48b42202436ea3485146bb5093a2238204bc7fdfa29c0b707be97e273a934d56409ed00eb1931355f2ed96b9e0ab7554b1d1adcf76b", 0x75}, {&(0x7f00009c4000)="8692", 0x2}], 0xa, 0x0) rt_sigsuspend(&(0x7f0000070000-0x8)={0xffffffffffffff01}, 0x8) 2017/12/06 19:31:56 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) [ 330.397939] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r2 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000295000-0x4)=r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:31:56 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000482000)={0x3, 0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r2 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r3 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r4 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r4, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:56 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:56 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) [ 330.622861] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:56 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:56 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:56 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) [ 330.689751] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r1 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80000) r2 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r3 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000303000-0x4)=0x7) link(&(0x7f0000d4a000-0x8)="2e2f66696c653100", &(0x7f0000eac000-0x8)="2e2f66696c653000") pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f000040c000)=[], 0x0, 0x0, 0x4, 0x0, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x6, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r3, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) [ 330.757841] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:57 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) [ 330.840006] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) [ 330.922038] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f000027d000-0x18)={0x0, 0xa628, 0x2, &(0x7f00007a0000)=0x0}) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:57 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 331.091170] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:57 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x20000, 0x400) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) [ 331.166673] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r0 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) r1 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r2 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, &(0x7f00000de000-0x8)=0x0, 0x100000001) gettid() bind$llc(r2, &(0x7f00001e2000)={0x1a, 0x1f, 0x6, 0x100000000, 0x2d4, 0x1, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, 0x10) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0xfffffffffffff000, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x905, 0x8]}) 2017/12/06 19:31:57 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) [ 331.420063] loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) [ 331.490681] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 2017/12/06 19:31:57 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:57 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) 2017/12/06 19:31:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:58 executing program 0: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) 2017/12/06 19:31:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") 2017/12/06 19:31:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:31:59 executing program 6: clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:31:59 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 2: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r3, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() inotify_init1(0x0) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() inotify_init1(0x0) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) gettid() kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 0: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 4: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:01 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) 2017/12/06 19:32:01 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:01 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) 2017/12/06 19:32:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() kcmp(r0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) 2017/12/06 19:32:02 executing program 3: clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:32:02 executing program 6: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 3: clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() inotify_init1(0x0) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r2 = getpgrp(0x0) kcmp(r1, r2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(0x0, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) ioctl$DRM_IOCTL_VERSION(r6, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000b8a000-0x14)={0x401, 0xcce, 0xffffffff, 0x4, 0xfa72}, 0x14) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x0, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) 2017/12/06 19:32:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r0, &(0x7f0000d76000)=@file={0x0, "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}, &(0x7f000095f000-0x4)=0x47) 2017/12/06 19:32:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0) accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74) fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0) open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002) syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8) r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0) creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:32:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:02 executing program 1: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e9000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) open(&(0x7f00005c3000)="2e2f66696c653000", 0xffffffffffffffff, 0x20000002) mknod$loop(&(0x7f000045a000-0x8)="2e2f66696c653000", 0x14, 0x1) r0 = syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r1 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[], 0x0, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, {0x1740000, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000de000-0x8)=0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00006fe000-0xe8)={0x0, 0x0, 0x0, 0x0, 0x3ea, 0x0, 0x0, 0x1e, 0xd, "32b05d801e6649b812d2e6b6cc159442b12153132c9bf944cf270012da21ba80c040397714f77faa1e8ed3fc7209d64d14cec7479b05cae0c732de3ab6cc5f4b", "941406569a73d06556aee2943f5e94c844a55527af84fb28f011825af60910e7706eb4786b3a976da7b57211af834e7d98b839629689a1472f5578b2998bd7da", "efd55922a7dc329394610afbacd237d234afb805ebc3b94e4fb9d56dd03f1f8b", [0x0, 0x8]}) 2017/12/06 19:32:03 executing program 1: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:03 executing program 0: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:03 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) fdatasync(r0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000a3f000)="2f6465762f73657175656e6365723200", 0x4881, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00002d1000-0xb)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000d21000)=0xb) 2017/12/06 19:32:03 executing program 1 (fault-call:1 fault-nth:0): pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:03 executing program 0: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:03 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0) accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74) fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0) open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002) syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8) r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0) creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="b5107b981c0ded899442eec2cab7e2c9e6cd9aeeb418ded008972303339ea7481aa2b3d0786a901740a86abe4507453217c9f6a4aff9f42d64e9dfe95edc99ab6e28e2cfb889b900a9d999140b4717bd6480ea000f7e167ee7bec2cfe31673a88ba160a9bd593eb0d90f1e0c2eee40a142a50a08137ae8658de4d1a08ad6d2381cfd97300209065a180169b7947c32ce3f3ff422a7652804505a06a056738b6274588232de69f67825ae03139e7d60ca79c59408e649fac93d6bab13112e70b8a52e68ad63bac4f0aaba1b7133779fdab06f09e022f9d605e80051ce429d2812f632f6585828933f8bc15d7927e41b1ebb16e71593d92ece21d5f04254c2c74167abcb2f277613bc7f7cdb6a3698e2a879fabb481015928f06d3925ca803f5cb275c381c3e91f452708ec8827d8c762cb886e868690d1a625978d7b9786f21a7d60f273a5fb5c8a0dddcaa65387264a104caf82a451f4e83928aa5d5faa79f0095bf9cae38316ab8a273df80dd74c0c1a0f8daa2006d01adcb97229deb1bdfdb57d17a98415d1aba542697f1a92b45ca502dc8b51bf54ba17dcca0e1fe5c5252243f0cf97ad61044c5efb43a26ae004b06bff69df7edf248c03c", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:32:03 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:03 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:0): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:03 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:03 executing program 0: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:03 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:1): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) [ 336.826551] FAULT_INJECTION: forcing a failure. [ 336.826551] name failslab, interval 1, probability 0, space 0, times 0 2017/12/06 19:32:03 executing program 0: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") [ 336.830558] FAULT_INJECTION: forcing a failure. [ 336.830558] name failslab, interval 1, probability 0, space 0, times 0 [ 336.830568] CPU: 1 PID: 24654 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120 [ 336.830572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.830575] Call Trace: [ 336.830588] dump_stack+0x194/0x257 [ 336.830601] ? arch_local_irq_restore+0x53/0x53 2017/12/06 19:32:03 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r5 = getpgrp(0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r4, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:03 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:03 executing program 0: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) 2017/12/06 19:32:03 executing program 4 (fault-call:3 fault-nth:2): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:03 executing program 0 (fault-call:0 fault-nth:0): pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) [ 336.830609] ? find_held_lock+0x39/0x1d0 [ 336.830642] should_fail+0x8c0/0xa40 [ 336.830650] ? lock_downgrade+0x980/0x980 [ 336.830663] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.830678] ? map_files_get_link+0x3a0/0x3a0 [ 336.830684] ? __lock_is_held+0xbc/0x140 [ 336.830700] ? find_held_lock+0x39/0x1d0 [ 336.830726] ? lock_downgrade+0x980/0x980 [ 336.830760] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 336.830776] ? rcu_note_context_switch+0x710/0x710 [ 336.830798] should_failslab+0xec/0x120 [ 336.830810] kmem_cache_alloc+0x47/0x760 [ 336.830824] ? fput+0xd2/0x140 [ 336.830841] getname_flags+0xcb/0x580 [ 336.830848] ? SyS_read+0x220/0x220 [ 336.830863] getname+0x19/0x20 [ 336.830872] compat_SyS_execve+0x1f/0x50 [ 336.830882] ? SyS_execveat+0x60/0x60 [ 336.830892] do_fast_syscall_32+0x3ee/0xf9d [ 336.830912] ? do_int80_syscall_32+0x9d0/0x9d0 [ 336.830930] ? lockdep_sys_exit+0x47/0xf0 [ 336.830940] ? syscall_return_slowpath+0x2ad/0x550 [ 336.830955] ? sysret32_from_system_call+0x5/0x3b [ 336.830972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.830992] entry_SYSENTER_compat+0x51/0x60 [ 336.830998] RIP: 0023:0xf7f66c79 [ 336.831002] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 336.831011] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8 [ 336.831015] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.831019] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 336.831023] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.831028] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 336.887616] FAULT_INJECTION: forcing a failure. [ 336.887616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.887627] CPU: 0 PID: 24677 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120 [ 336.887632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.887635] Call Trace: [ 336.887647] dump_stack+0x194/0x257 [ 336.887663] ? arch_local_irq_restore+0x53/0x53 [ 336.887692] should_fail+0x8c0/0xa40 [ 336.887709] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.887735] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 336.887757] ? lock_downgrade+0x980/0x980 [ 336.887767] ? __lock_is_held+0xbc/0x140 [ 336.887796] ? find_held_lock+0x39/0x1d0 [ 336.887810] ? check_noncircular+0x20/0x20 [ 336.887825] ? should_fail+0x23b/0xa40 [ 336.887832] ? lock_downgrade+0x980/0x980 [ 336.887856] __alloc_pages_nodemask+0x338/0xd80 [ 336.887870] ? map_files_get_link+0x3a0/0x3a0 [ 336.887877] ? __lock_is_held+0xbc/0x140 [ 336.887895] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 336.887902] ? find_held_lock+0x39/0x1d0 [ 336.887929] ? lock_downgrade+0x980/0x980 [ 336.887967] ? rcu_note_context_switch+0x710/0x710 [ 336.887988] cache_grow_begin+0x72/0x3f0 [ 336.888005] kmem_cache_alloc+0x403/0x760 [ 336.888033] getname_flags+0xcb/0x580 [ 336.888042] ? SyS_read+0x220/0x220 [ 336.888058] getname+0x19/0x20 [ 336.888069] compat_SyS_execve+0x1f/0x50 [ 336.888081] ? SyS_execveat+0x60/0x60 [ 336.888093] do_fast_syscall_32+0x3ee/0xf9d [ 336.888115] ? do_int80_syscall_32+0x9d0/0x9d0 [ 336.888127] ? _raw_spin_unlock_irq+0x56/0x70 [ 336.888157] ? syscall_return_slowpath+0x2ad/0x550 [ 336.888175] ? sysret32_from_system_call+0x5/0x3b [ 336.888195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.888217] entry_SYSENTER_compat+0x51/0x60 [ 336.888224] RIP: 0023:0xf7f66c79 [ 336.888229] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 336.888239] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8 [ 336.888245] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.888250] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 336.888255] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.888260] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 336.992758] FAULT_INJECTION: forcing a failure. [ 336.992758] name failslab, interval 1, probability 0, space 0, times 0 [ 336.992768] CPU: 1 PID: 24710 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120 [ 336.992773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.992776] Call Trace: [ 336.992788] dump_stack+0x194/0x257 [ 336.992803] ? arch_local_irq_restore+0x53/0x53 [ 336.992832] should_fail+0x8c0/0xa40 [ 336.992848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.992867] ? __lock_acquire+0x6e9/0x47f0 [ 336.992884] ? find_held_lock+0x39/0x1d0 [ 336.992913] ? lock_downgrade+0x980/0x980 [ 336.992951] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 336.992967] ? rcu_note_context_switch+0x710/0x710 [ 336.992993] should_failslab+0xec/0x120 [ 336.993010] kmem_cache_alloc+0x47/0x760 [ 336.993017] ? find_held_lock+0x39/0x1d0 [ 336.993045] dup_fd+0x110/0xdf0 [ 336.993052] ? lock_downgrade+0x980/0x980 [ 336.993076] ? __fdget+0x20/0x20 [ 336.993103] ? lock_downgrade+0x980/0x980 [ 336.993116] ? __bpf_address_lookup+0x2b0/0x2b0 [ 336.993137] ? lock_release+0xda0/0xda0 [ 336.993149] ? __free_insn_slot+0x5c0/0x5c0 [ 336.993176] unshare_fd+0x17f/0x280 [ 336.993189] ? mm_init+0xb30/0xb30 [ 336.993202] ? kernel_text_address+0x102/0x140 [ 336.993220] ? unwind_get_return_address+0x61/0xa0 [ 336.993233] ? __save_stack_trace+0x7e/0xd0 [ 336.993248] unshare_files+0xa6/0x290 [ 336.993256] ? depot_save_stack+0x12c/0x490 [ 336.993272] ? SyS_unshare+0xfa0/0xfa0 [ 336.993285] ? save_stack+0xa3/0xd0 [ 336.993307] do_execveat_common.isra.30+0x3a3/0x23c0 [ 336.993316] ? do_fast_syscall_32+0x3ee/0xf9d [ 336.993323] ? entry_SYSENTER_compat+0x51/0x60 [ 336.993349] ? prepare_bprm_creds+0x110/0x110 [ 336.993360] ? check_stack_object+0x68/0x140 [ 336.993377] ? __check_object_size+0x25d/0x4f0 [ 336.993393] ? check_stack_object+0x140/0x140 [ 336.993409] ? do_raw_spin_trylock+0x190/0x190 [ 336.993424] ? rcu_pm_notify+0xc0/0xc0 [ 336.993440] ? strncpy_from_user+0x323/0x430 [ 336.993457] ? mpi_resize+0x200/0x200 [ 336.993481] ? getname_flags+0x256/0x580 [ 336.993501] compat_SyS_execve+0x3f/0x50 [ 336.993512] ? SyS_execveat+0x60/0x60 [ 336.993521] do_fast_syscall_32+0x3ee/0xf9d [ 336.993541] ? do_int80_syscall_32+0x9d0/0x9d0 [ 336.993558] ? lockdep_sys_exit+0x47/0xf0 [ 336.993568] ? syscall_return_slowpath+0x2ad/0x550 [ 336.993583] ? sysret32_from_system_call+0x5/0x3b [ 336.993599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.993618] entry_SYSENTER_compat+0x51/0x60 [ 336.993624] RIP: 0023:0xf7f66c79 [ 336.993629] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 336.993644] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8 [ 336.993648] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.993653] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 336.993657] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 336.993661] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 337.003934] FAULT_INJECTION: forcing a failure. [ 337.003934] name failslab, interval 1, probability 0, space 0, times 0 [ 337.003947] CPU: 1 PID: 24715 Comm: syz-executor0 Not tainted 4.15.0-rc2+ #120 [ 337.003955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.003959] Call Trace: [ 337.003972] dump_stack+0x194/0x257 [ 337.003988] ? arch_local_irq_restore+0x53/0x53 [ 337.004020] should_fail+0x8c0/0xa40 [ 337.004035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.004048] ? find_held_lock+0x39/0x1d0 [ 337.004060] ? check_noncircular+0x20/0x20 [ 337.004075] ? find_held_lock+0x39/0x1d0 [ 337.004103] ? lock_downgrade+0x980/0x980 [ 337.004140] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 337.004156] ? rcu_note_context_switch+0x710/0x710 [ 337.004166] ? get_pid_task+0xbc/0x140 [ 337.004189] should_failslab+0xec/0x120 [ 337.004203] kmem_cache_alloc+0x47/0x760 [ 337.004216] ? find_held_lock+0x39/0x1d0 [ 337.004238] alloc_inode+0x128/0x180 [ 337.004251] new_inode_pseudo+0x69/0x190 [ 337.004261] ? prune_icache_sb+0x1a0/0x1a0 [ 337.004269] ? kernel_read+0x120/0x120 [ 337.004283] ? wait_for_completion+0x7b0/0x7b0 [ 337.004304] create_pipe_files+0x9a/0x940 [ 337.004318] ? fifo_open+0xa40/0xa40 [ 337.004348] __do_pipe_flags+0x35/0x220 [ 337.004364] SyS_pipe2+0x9b/0x2f0 [ 337.004375] ? do_pipe_flags+0x1a0/0x1a0 [ 337.004382] ? SyS_write+0x184/0x220 [ 337.004390] ? __do_page_fault+0x3d6/0xc90 [ 337.004404] ? SyS_read+0x220/0x220 [ 337.004419] ? do_fast_syscall_32+0x156/0xf9d [ 337.004435] ? do_pipe_flags+0x1a0/0x1a0 [ 337.004448] do_fast_syscall_32+0x3ee/0xf9d [ 337.004470] ? do_int80_syscall_32+0x9d0/0x9d0 [ 337.004491] ? lockdep_sys_exit+0x47/0xf0 [ 337.004502] ? syscall_return_slowpath+0x2ad/0x550 [ 337.004520] ? sysret32_from_system_call+0x5/0x3b [ 337.004540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.004562] entry_SYSENTER_compat+0x51/0x60 [ 337.004568] RIP: 0023:0xf7f09c79 [ 337.004573] RSP: 002b:00000000f770508c EFLAGS: 00000296 ORIG_RAX: 000000000000014b [ 337.004583] RAX: ffffffffffffffda RBX: 0000000020fb0ff8 RCX: 0000000000000000 [ 337.004588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 337.004593] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 337.004598] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 337.004602] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 337.884583] CPU: 1 PID: 24652 Comm: syz-executor1 Not tainted 4.15.0-rc2+ #120 [ 337.893743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.903063] Call Trace: [ 337.905623] dump_stack+0x194/0x257 [ 337.909229] ? arch_local_irq_restore+0x53/0x53 [ 337.913876] should_fail+0x8c0/0xa40 [ 337.917561] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.922636] ? lock_page_memcg+0x2bd/0x3b0 [ 337.926842] ? find_held_lock+0x39/0x1d0 [ 337.930880] ? lock_downgrade+0x980/0x980 [ 337.935018] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 337.940873] ? rcu_note_context_switch+0x710/0x710 [ 337.945776] should_failslab+0xec/0x120 [ 337.949719] kmem_cache_alloc_node+0x56/0x760 [ 337.954184] ? reacquire_held_locks+0x201/0x3e0 [ 337.958824] copy_process.part.36+0x1a6a/0x4ae0 [ 337.963459] ? __lock_acquire+0x6e9/0x47f0 [ 337.967671] ? __cleanup_sighand+0x40/0x40 [ 337.971879] ? print_usage_bug+0x3f0/0x3f0 [ 337.976079] ? wake_up_page_bit+0x530/0x530 [ 337.980717] ? __lock_is_held+0xbc/0x140 [ 337.984762] ? __lock_acquire+0x6e9/0x47f0 [ 337.988973] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 337.994138] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 337.999292] ? get_mem_cgroup_from_mm+0x49b/0x710 [ 338.004100] ? check_noncircular+0x20/0x20 [ 338.008301] ? print_usage_bug+0x3f0/0x3f0 [ 338.012503] ? print_usage_bug+0x3f0/0x3f0 [ 338.016706] ? check_noncircular+0x20/0x20 [ 338.020911] ? lock_acquire+0x1d5/0x580 [ 338.024851] ? __fdget_pos+0x131/0x1a0 [ 338.028708] ? check_noncircular+0x20/0x20 [ 338.032920] ? lock_downgrade+0x980/0x980 [ 338.037350] ? check_noncircular+0x20/0x20 [ 338.042716] ? find_held_lock+0x39/0x1d0 [ 338.046752] ? check_noncircular+0x20/0x20 [ 338.050961] ? lock_downgrade+0x980/0x980 [ 338.055076] ? __lock_is_held+0xbc/0x140 [ 338.059112] ? find_held_lock+0x39/0x1d0 [ 338.063149] ? lock_downgrade+0x980/0x980 [ 338.067264] ? get_pid_task+0xbc/0x140 [ 338.071120] ? proc_fail_nth_write+0xb5/0x260 [ 338.075583] ? map_files_get_link+0x3a0/0x3a0 [ 338.080041] ? __lock_is_held+0xbc/0x140 [ 338.084074] _do_fork+0x1ef/0xff0 [ 338.087499] ? fork_idle+0x2d0/0x2d0 [ 338.091446] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.096954] ? kernel_read+0x120/0x120 [ 338.100808] ? wait_for_completion+0x7b0/0x7b0 [ 338.105626] ? __lock_is_held+0xbc/0x140 [ 338.110884] ? __sb_end_write+0x9e/0xd0 [ 338.115437] ? fput+0xd2/0x140 [ 338.118610] ? SyS_write+0x184/0x220 [ 338.122290] ? __do_page_fault+0x3d6/0xc90 [ 338.126501] ? SyS_read+0x220/0x220 [ 338.130099] SyS_clone+0x37/0x50 [ 338.133433] ? entry_INT80_compat+0x40/0x40 [ 338.137725] do_fast_syscall_32+0x3ee/0xf9d [ 338.142021] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.146575] ? lockdep_sys_exit+0x47/0xf0 [ 338.150689] ? syscall_return_slowpath+0x2ad/0x550 [ 338.155848] ? sysret32_from_system_call+0x5/0x3b [ 338.160663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.165477] entry_SYSENTER_compat+0x51/0x60 [ 338.169854] RIP: 0023:0xf7fd7c79 [ 338.173184] RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.180859] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020fbf000 [ 338.188096] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.195332] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 2017/12/06 19:32:04 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f000069c000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:0): clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:04 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r1 = gettid() r2 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r2, 0x8, r3) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r2, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) getpgrp(0x0) getpeername$inet(r0, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:04 executing program 0 (fault-call:0 fault-nth:1): pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) 2017/12/06 19:32:04 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000d1c000-0xd)="2f6465762f736e642f73657100", 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x80000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000095b000)="2f6465762f6c6f6f702300", 0x1, 0x2080) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00001bf000-0x11)="2f6465762f7667615f6172626974657200", 0xa00, 0x0) accept4$inet6(r1, &(0x7f000054e000-0x1c)={0x0, 0x0, 0x0, @local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f00002f0000)=0x1c, 0x80000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000d7e000-0x98)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x1e, 0x3, 0x14, "4de77ad1577d04b5f731687217ea5d439cd91fb2628ff716401622fc14d10da8cec66b8b4e3b67611da67eba91dfa95fdfd5d81b9059b765cc95b880004d84fb", "64c2102406a3c3b8132580db7e807c3057a8be136c4a1cbf1ff9377e4071382c", [0x1e, 0x9], 0x0}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000a4a000)=[@in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x75}, @in={0x2, 0x3, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0x5, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x1}, @in6={0xa, 0x2, 0x80, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x7}], 0x74) fstat(0xffffffffffffffff, &(0x7f00003e9000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mknod(&(0x7f00005dd000)="2e2f66696c653000", 0x103d, 0x0) open$dir(&(0x7f00004be000)="2e2f66696c653000", 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000381000-0x9)="2f6465762f73672300", 0x400, 0x402002) syz_open_dev$urandom(&(0x7f0000c14000)="2f6465762f7572616e646f6d00", 0x0, 0x4800) getsockopt$ax25_int(r3, 0x101, 0x5, &(0x7f0000a79000-0x4)=0x0, &(0x7f0000911000)=0x4) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f000051f000)={0x9, 0x400}, 0x8) r4 = creat(&(0x7f0000496000)="2e2f66696c653000", 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000090a000)=[@in6={0xa, 0x1, 0x100, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x2, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x2, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3fe0000000000, @loopback={0x0, 0x1}, 0x401}, @in={0x2, 0x1, @multicast1=0xe0000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x0, 0x3, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x9, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x10000}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}], 0xd0) creat(&(0x7f0000f5e000-0x8)="2e2f66696c653000", 0x80) request_key(&(0x7f0000003000)="646e735f7265736f6c76657200", &(0x7f0000014000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000004000-0xc)="262f2973656c696e75782900", 0x0) r5 = open(&(0x7f0000000000)="2e2f66696c653000", 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00002c5000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000014e000-0x4)=0xe8) epoll_create1(0x80002) syz_open_dev$loop(&(0x7f000040b000-0xb)="2f6465762f6c6f6f702300", 0x0, 0x1) r6 = memfd_create(&(0x7f0000c8e000-0x8)="5c73797374656d00", 0x2) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000c14000-0x200)="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", 0x1ba}], 0x1, 0x49) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000132000-0x3a)={&(0x7f0000a76000)=[], 0x0, 0x0, 0x4, 0x4, 0x4, 0x9e, {0x1740000, 0xd7, 0x2, 0x2, 0x0, 0x40, 0x0, 0x1, 0x8, 0xa, 0x0, 0x3f, 0x2, 0x7f, "e4fab28541cde2adae9ee6956aa47a9229000e6db56be6eaa9a658af8aa5d910"}}) 2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:3): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:04 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:04 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() r1 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r1, 0x8, r2) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000535000)=0x0, &(0x7f00009bc000)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r4 = getpgrp(0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000af0000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000f93000-0x4)=0x10) kcmp(0x0, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0246400, &(0x7f0000c08000)={0x10000, 0x9, 0xe55, 0x8f, &(0x7f00002e0000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x6f, &(0x7f0000ddb000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x32, &(0x7f00004cf000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"}) 2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:1): clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 338.202569] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.209804] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.237837] FAULT_INJECTION: forcing a failure. [ 338.237837] name failslab, interval 1, probability 0, space 0, times 0 2017/12/06 19:32:04 executing program 1: pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") r0 = getpgid(0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f000094e000-0x58)={0x0, 0x2d, 0x1, @tid=r0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000000)=0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) 2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:4): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:2): clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:3): clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 338.245212] FAULT_INJECTION: forcing a failure. [ 338.245212] name failslab, interval 1, probability 0, space 0, times 0 [ 338.245221] CPU: 1 PID: 24736 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120 [ 338.245226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2017/12/06 19:32:04 executing program 1: pipe2(&(0x7f0000129000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) clone(0x0, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00006ba000-0x4)=0x0, &(0x7f0000001000-0x4)=0x4) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) fcntl$setflags(r0, 0x2, 0x1) 2017/12/06 19:32:04 executing program 3 (fault-call:0 fault-nth:4): clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") inotify_init1(0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 2017/12/06 19:32:04 executing program 4 (fault-call:3 fault-nth:5): mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000)="", &(0x7f0000744000)=0x0, &(0x7f0000f8b000)=0x0, &(0x7f0000804000)="") mknod(&(0x7f0000f80000)="2e2f66696c653000", 0x1041, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000058e000-0xc)={0x0, 0x0, 0x0}, &(0x7f00008cc000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000fcc000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) creat(&(0x7f0000b7a000)="2e2f66696c653000", 0x0) 2017/12/06 19:32:04 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)="2f6465762f6375736500", 0x8000, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000002000-0x4)=0x0, &(0x7f0000001000)=0x4) ioctl$TIOCSTI(r0, 0x5412, 0x7) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000178000)=0x5, 0x4) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000000000)=[{&(0x7f0000003000-0x58)={0x27, 0x4, 0xfff, 0x2, 0x3, 0x2, "76f96e734651620ebcf9c9891ce24c9bc325ce618da8edb2975accf61d4181b053610786824f9589cf56bfb416300c49624670d1af4b4e6fcd7e84776c0d23", 0x100}, 0x58, &(0x7f0000003000-0x18)=[{&(0x7f0000000000)="182273e5a84f250dd22d17a7ebc5df68dabfbd1436becfc2795efa2875d1ff53cdd36c7a30f85153db2a31d65a2b084ba8ca2ab7338c3f02f7288226de3b951c62e71f1566d26d98f24be378bdccb1cb8b6f7ae01fa3f9863d2136b671fe41b691cde815e4cf5e980263f4a8bb6cbfdf35ee92303367bc", 0x77}, {&(0x7f0000002000-0xbd)="f0ae94c19d97bb33e748dbbb0d218997f9ad5604846d22e805c081d719d81bd3b6b37ea2918f7ddf0ba078836e866b911b58e3f5697e430f37be6be6581f43784709bce1d02cd7f91fc8568bd67bd30f87a5cf41fadaa6ec4b6c632f58d366da4129352d632fa639f2ab66a16b3c6957c618ebbf3fa45b7d1b29c2273b5209355627a2c9ebd6b65c581fb9ffb3a0674b694ec260661edab79c22bb268244457acb9c4d5b14cfb8c19ac629923cda7b278fcbacbffef0975d34c0e4901f", 0xbd}, {&(0x7f0000000000)="4ba73f7f22040475ad868231577e4cc52b0d593963a043", 0x17}], 0x3, &(0x7f0000003000-0x80)={0x80, 0x100, 0x3ff, "9ae309ad947b18b055deb4c67fb7d4c3c23ea8ba00ba50781ea388de08cd48ac5619ab293a84c72892e331e9a10309b6bcd2f4a3a66f9b665986e0bf7840a5ca7ccf9b2ed1b9097d59c158f3194c15e1a6d551cf89c5da8c2a66b8991a3ef46fe0596417acf26254b990b2ba02a569bcbce628"}, 0x80, 0x4000000}], 0x1, 0x80) clone(0x2, &(0x7f0000001000-0x1)="a9", &(0x7f0000744000)=0x0, &(0x7f0000c96000-0x4)=0x0, &(0x7f0000804000)="") execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) [ 338.245229] Call Trace: [ 338.245241] dump_stack+0x194/0x257 [ 338.245254] ? arch_local_irq_restore+0x53/0x53 [ 338.245267] ? lock_downgrade+0x980/0x980 [ 338.245288] should_fail+0x8c0/0xa40 [ 338.245297] ? __fdget+0x20/0x20 [ 338.245310] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.245335] ? find_held_lock+0x39/0x1d0 [ 338.245360] ? lock_downgrade+0x980/0x980 [ 338.245392] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.245407] ? rcu_note_context_switch+0x710/0x710 [ 338.245414] ? unwind_get_return_address+0x61/0xa0 [ 338.245435] should_failslab+0xec/0x120 [ 338.245447] kmem_cache_alloc_trace+0x4b/0x750 [ 338.245454] ? SyS_unshare+0xfa0/0xfa0 [ 338.245466] ? save_stack+0xa3/0xd0 [ 338.245486] do_execveat_common.isra.30+0x3ea/0x23c0 [ 338.245493] ? do_fast_syscall_32+0x3ee/0xf9d [ 338.245500] ? entry_SYSENTER_compat+0x51/0x60 [ 338.245527] ? prepare_bprm_creds+0x110/0x110 [ 338.245535] ? check_stack_object+0x68/0x140 [ 338.245551] ? __check_object_size+0x25d/0x4f0 [ 338.245576] ? do_raw_spin_trylock+0x190/0x190 [ 338.245591] ? rcu_pm_notify+0xc0/0xc0 [ 338.245614] ? strncpy_from_user+0x323/0x430 [ 338.245631] ? mpi_resize+0x200/0x200 [ 338.245657] ? getname_flags+0x256/0x580 [ 338.245677] compat_SyS_execve+0x3f/0x50 [ 338.245688] ? SyS_execveat+0x60/0x60 [ 338.245696] do_fast_syscall_32+0x3ee/0xf9d [ 338.245716] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.245731] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 338.245744] ? lockdep_sys_exit+0x47/0xf0 [ 338.245754] ? syscall_return_slowpath+0x2ad/0x550 [ 338.245769] ? sysret32_from_system_call+0x5/0x3b [ 338.245786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.245806] entry_SYSENTER_compat+0x51/0x60 [ 338.245813] RIP: 0023:0xf7f66c79 [ 338.245817] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 338.245825] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8 [ 338.245830] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 338.245834] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.245838] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.245842] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.253109] FAULT_INJECTION: forcing a failure. [ 338.253109] name failslab, interval 1, probability 0, space 0, times 0 [ 338.253120] CPU: 0 PID: 24739 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.253125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.253128] Call Trace: [ 338.253141] dump_stack+0x194/0x257 [ 338.253155] ? arch_local_irq_restore+0x53/0x53 [ 338.253184] should_fail+0x8c0/0xa40 [ 338.253199] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.253215] ? lock_page_memcg+0x2bd/0x3b0 [ 338.253235] ? find_held_lock+0x39/0x1d0 [ 338.253265] ? lock_downgrade+0x980/0x980 [ 338.253301] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.253317] ? rcu_note_context_switch+0x710/0x710 [ 338.253341] should_failslab+0xec/0x120 [ 338.253354] kmem_cache_alloc_node+0x56/0x760 [ 338.253371] ? reacquire_held_locks+0x201/0x3e0 [ 338.253392] copy_process.part.36+0x1a6a/0x4ae0 [ 338.253405] ? __lock_acquire+0x6e9/0x47f0 [ 338.253434] ? __cleanup_sighand+0x40/0x40 [ 338.253458] ? print_usage_bug+0x3f0/0x3f0 [ 338.253467] ? wake_up_page_bit+0x530/0x530 [ 338.253490] ? update_cfs_rq_load_avg.part.70+0x2d0/0x2d0 [ 338.253526] ? __lock_acquire+0x6e9/0x47f0 [ 338.253556] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.253581] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.253594] ? check_noncircular+0x20/0x20 [ 338.253612] ? print_usage_bug+0x3f0/0x3f0 [ 338.253626] ? check_noncircular+0x20/0x20 [ 338.253645] ? lock_acquire+0x1d5/0x580 [ 338.253656] ? __fdget_pos+0x131/0x1a0 [ 338.253674] ? check_noncircular+0x20/0x20 [ 338.253702] ? lock_downgrade+0x980/0x980 [ 338.253714] ? check_noncircular+0x20/0x20 [ 338.253739] ? find_held_lock+0x39/0x1d0 [ 338.253751] ? check_noncircular+0x20/0x20 [ 338.253775] ? lock_downgrade+0x980/0x980 [ 338.253785] ? __lock_is_held+0xbc/0x140 [ 338.253816] ? find_held_lock+0x39/0x1d0 [ 338.253846] ? lock_downgrade+0x980/0x980 [ 338.253858] ? get_pid_task+0xbc/0x140 [ 338.253872] ? proc_fail_nth_write+0xb5/0x260 [ 338.253884] ? map_files_get_link+0x3a0/0x3a0 [ 338.253891] ? __lock_is_held+0xbc/0x140 [ 338.253911] _do_fork+0x1ef/0xff0 [ 338.253932] ? fork_idle+0x2d0/0x2d0 [ 338.253950] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.253961] ? kernel_read+0x120/0x120 [ 338.253974] ? wait_for_completion+0x7b0/0x7b0 [ 338.253993] ? __lock_is_held+0xbc/0x140 [ 338.254030] ? __sb_end_write+0x9e/0xd0 [ 338.254048] ? fput+0xd2/0x140 [ 338.254059] ? SyS_write+0x184/0x220 [ 338.254066] ? __schedule+0x2060/0x2060 [ 338.254080] ? SyS_read+0x220/0x220 [ 338.254105] SyS_clone+0x37/0x50 [ 338.254117] ? entry_INT80_compat+0x40/0x40 [ 338.254132] do_fast_syscall_32+0x3ee/0xf9d [ 338.254152] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.254165] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 338.254177] ? lockdep_sys_exit+0x47/0xf0 [ 338.254188] ? syscall_return_slowpath+0x2ad/0x550 [ 338.254204] ? sysret32_from_system_call+0x5/0x3b [ 338.254223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.254246] entry_SYSENTER_compat+0x51/0x60 [ 338.254253] RIP: 0023:0xf7f06c79 [ 338.254258] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.254267] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.254272] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.254277] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.254282] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.254286] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.275682] FAULT_INJECTION: forcing a failure. [ 338.275682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.275700] CPU: 1 PID: 24754 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.275704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.275707] Call Trace: [ 338.275719] dump_stack+0x194/0x257 [ 338.275732] ? arch_local_irq_restore+0x53/0x53 [ 338.275758] should_fail+0x8c0/0xa40 [ 338.275772] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.275796] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.275809] ? __lock_acquire+0x6e9/0x47f0 [ 338.275835] ? __lock_acquire+0x6e9/0x47f0 [ 338.275859] ? check_noncircular+0x20/0x20 [ 338.275867] ? lock_pin_lock+0x370/0x370 [ 338.275880] ? should_fail+0x23b/0xa40 [ 338.275903] __alloc_pages_nodemask+0x338/0xd80 [ 338.275914] ? lock_page_memcg+0x2bd/0x3b0 [ 338.275934] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 338.275941] ? find_held_lock+0x39/0x1d0 [ 338.275968] ? lock_downgrade+0x980/0x980 [ 338.276009] ? rcu_note_context_switch+0x710/0x710 [ 338.276026] cache_grow_begin+0x72/0x3f0 [ 338.276043] kmem_cache_alloc_node+0x443/0x760 [ 338.276072] copy_process.part.36+0x1a6a/0x4ae0 [ 338.276084] ? __lock_acquire+0x6e9/0x47f0 [ 338.276110] ? __cleanup_sighand+0x40/0x40 [ 338.276132] ? print_usage_bug+0x3f0/0x3f0 [ 338.276139] ? wake_up_page_bit+0x530/0x530 [ 338.276152] ? __lock_is_held+0xbc/0x140 [ 338.276189] ? __lock_acquire+0x6e9/0x47f0 [ 338.276213] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.276236] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.276244] ? get_mem_cgroup_from_mm+0x49b/0x710 [ 338.276253] ? check_noncircular+0x20/0x20 [ 338.276263] ? print_usage_bug+0x3f0/0x3f0 [ 338.276274] ? print_usage_bug+0x3f0/0x3f0 [ 338.276287] ? check_noncircular+0x20/0x20 [ 338.276304] ? lock_acquire+0x1d5/0x580 [ 338.276313] ? __fdget_pos+0x131/0x1a0 [ 338.276329] ? check_noncircular+0x20/0x20 [ 338.276353] ? lock_downgrade+0x980/0x980 [ 338.276363] ? check_noncircular+0x20/0x20 [ 338.276385] ? find_held_lock+0x39/0x1d0 [ 338.276395] ? check_noncircular+0x20/0x20 [ 338.276416] ? lock_downgrade+0x980/0x980 [ 338.276424] ? __lock_is_held+0xbc/0x140 [ 338.276451] ? find_held_lock+0x39/0x1d0 [ 338.276478] ? lock_downgrade+0x980/0x980 [ 338.276489] ? get_pid_task+0xbc/0x140 [ 338.276500] ? proc_fail_nth_write+0xb5/0x260 [ 338.276511] ? map_files_get_link+0x3a0/0x3a0 [ 338.276518] ? __lock_is_held+0xbc/0x140 [ 338.276536] _do_fork+0x1ef/0xff0 [ 338.276555] ? fork_idle+0x2d0/0x2d0 [ 338.276571] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.276580] ? kernel_read+0x120/0x120 [ 338.276592] ? wait_for_completion+0x7b0/0x7b0 [ 338.276613] ? __lock_is_held+0xbc/0x140 [ 338.276647] ? __sb_end_write+0x9e/0xd0 [ 338.276663] ? fput+0xd2/0x140 [ 338.276672] ? SyS_write+0x184/0x220 [ 338.276681] ? __do_page_fault+0x3d6/0xc90 [ 338.276695] ? SyS_read+0x220/0x220 [ 338.276713] SyS_clone+0x37/0x50 [ 338.276724] ? entry_INT80_compat+0x40/0x40 [ 338.276737] do_fast_syscall_32+0x3ee/0xf9d [ 338.276757] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.276776] ? lockdep_sys_exit+0x47/0xf0 [ 338.276786] ? syscall_return_slowpath+0x2ad/0x550 [ 338.276800] ? sysret32_from_system_call+0x5/0x3b [ 338.276817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.276837] entry_SYSENTER_compat+0x51/0x60 [ 338.276843] RIP: 0023:0xf7f06c79 [ 338.276847] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.276855] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.276860] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.276864] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.276868] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.276872] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.301690] FAULT_INJECTION: forcing a failure. [ 338.301690] name failslab, interval 1, probability 0, space 0, times 0 [ 338.301702] CPU: 1 PID: 24763 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.301707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.301711] Call Trace: [ 338.301723] dump_stack+0x194/0x257 [ 338.301738] ? arch_local_irq_restore+0x53/0x53 [ 338.301767] should_fail+0x8c0/0xa40 [ 338.301783] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.301798] ? depot_save_stack+0x12c/0x490 [ 338.301820] ? find_held_lock+0x39/0x1d0 [ 338.301848] ? lock_downgrade+0x980/0x980 [ 338.301885] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.301902] ? rcu_note_context_switch+0x710/0x710 [ 338.301929] should_failslab+0xec/0x120 [ 338.301943] __kmalloc_track_caller+0x5f/0x760 [ 338.301949] ? rcu_pm_notify+0xc0/0xc0 [ 338.301966] ? prepare_creds+0x78/0x360 [ 338.301973] ? selinux_cred_prepare+0x43/0xa0 [ 338.301992] kmemdup+0x24/0x50 [ 338.302009] selinux_cred_prepare+0x43/0xa0 [ 338.302023] security_prepare_creds+0x7d/0xb0 [ 338.302040] prepare_creds+0x2b1/0x360 [ 338.302050] ? abort_creds+0x130/0x130 [ 338.302064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 338.302071] ? __lockdep_init_map+0xe4/0x650 [ 338.302090] copy_creds+0x7b/0x3a0 [ 338.302108] copy_process.part.36+0xb28/0x4ae0 [ 338.302119] ? __lock_acquire+0x6e9/0x47f0 [ 338.302140] ? __cleanup_sighand+0x40/0x40 [ 338.302159] ? print_usage_bug+0x3f0/0x3f0 [ 338.302166] ? wake_up_page_bit+0x530/0x530 [ 338.302179] ? __lock_is_held+0xbc/0x140 [ 338.302215] ? __lock_acquire+0x6e9/0x47f0 [ 338.302239] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.302261] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.302269] ? get_mem_cgroup_from_mm+0x49b/0x710 [ 338.302278] ? check_noncircular+0x20/0x20 [ 338.302288] ? print_usage_bug+0x3f0/0x3f0 [ 338.302299] ? print_usage_bug+0x3f0/0x3f0 [ 338.302312] ? check_noncircular+0x20/0x20 [ 338.302328] ? lock_acquire+0x1d5/0x580 [ 338.302337] ? __fdget_pos+0x131/0x1a0 [ 338.302352] ? check_noncircular+0x20/0x20 [ 338.302377] ? lock_downgrade+0x980/0x980 [ 338.302387] ? check_noncircular+0x20/0x20 [ 338.302409] ? find_held_lock+0x39/0x1d0 [ 338.302419] ? check_noncircular+0x20/0x20 [ 338.302440] ? lock_downgrade+0x980/0x980 [ 338.302449] ? __lock_is_held+0xbc/0x140 [ 338.302476] ? find_held_lock+0x39/0x1d0 [ 338.302502] ? lock_downgrade+0x980/0x980 [ 338.302512] ? get_pid_task+0xbc/0x140 [ 338.302525] ? proc_fail_nth_write+0xb5/0x260 [ 338.302535] ? map_files_get_link+0x3a0/0x3a0 [ 338.302542] ? __lock_is_held+0xbc/0x140 [ 338.302560] _do_fork+0x1ef/0xff0 [ 338.302578] ? fork_idle+0x2d0/0x2d0 [ 338.302600] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.302611] ? kernel_read+0x120/0x120 [ 338.302623] ? wait_for_completion+0x7b0/0x7b0 [ 338.302642] ? __lock_is_held+0xbc/0x140 [ 338.302677] ? __sb_end_write+0x9e/0xd0 [ 338.302694] ? fput+0xd2/0x140 [ 338.302705] ? SyS_write+0x184/0x220 [ 338.302714] ? __do_page_fault+0x3d6/0xc90 [ 338.302727] ? SyS_read+0x220/0x220 [ 338.302746] SyS_clone+0x37/0x50 [ 338.302755] ? entry_INT80_compat+0x40/0x40 [ 338.302767] do_fast_syscall_32+0x3ee/0xf9d [ 338.302787] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.302805] ? lockdep_sys_exit+0x47/0xf0 [ 338.302815] ? syscall_return_slowpath+0x2ad/0x550 [ 338.302829] ? sysret32_from_system_call+0x5/0x3b [ 338.302847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.302866] entry_SYSENTER_compat+0x51/0x60 [ 338.302872] RIP: 0023:0xf7f06c79 [ 338.302876] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.302884] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.302889] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.302893] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.302897] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.302901] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.319866] FAULT_INJECTION: forcing a failure. [ 338.319866] name failslab, interval 1, probability 0, space 0, times 0 [ 338.319881] CPU: 1 PID: 24765 Comm: syz-executor4 Not tainted 4.15.0-rc2+ #120 [ 338.319886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.319889] Call Trace: [ 338.319901] dump_stack+0x194/0x257 [ 338.319915] ? arch_local_irq_restore+0x53/0x53 [ 338.319923] ? __might_sleep+0x95/0x190 [ 338.319948] should_fail+0x8c0/0xa40 [ 338.319962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.319973] ? mutex_lock_io_nested+0x1900/0x1900 [ 338.319984] ? __save_stack_trace+0x7e/0xd0 [ 338.320009] ? find_held_lock+0x39/0x1d0 [ 338.320040] ? __lock_is_held+0xbc/0x140 [ 338.320072] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.320087] ? rcu_note_context_switch+0x710/0x710 [ 338.320112] should_failslab+0xec/0x120 [ 338.320125] kmem_cache_alloc+0x47/0x760 [ 338.320137] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.320147] ? rcu_pm_notify+0xc0/0xc0 [ 338.320164] prepare_creds+0x78/0x360 [ 338.320174] ? abort_creds+0x130/0x130 [ 338.320187] ? do_execveat_common.isra.30+0x3ea/0x23c0 [ 338.320198] ? rcu_read_lock_sched_held+0x108/0x120 [ 338.320209] ? kmem_cache_alloc_trace+0x459/0x750 [ 338.320218] ? SyS_unshare+0xfa0/0xfa0 [ 338.320235] prepare_exec_creds+0x11/0xf0 [ 338.320248] prepare_bprm_creds+0x67/0x110 [ 338.320262] do_execveat_common.isra.30+0x40a/0x23c0 [ 338.320270] ? do_fast_syscall_32+0x3ee/0xf9d [ 338.320278] ? entry_SYSENTER_compat+0x51/0x60 [ 338.320307] ? prepare_bprm_creds+0x110/0x110 [ 338.320317] ? check_stack_object+0x68/0x140 [ 338.320335] ? __check_object_size+0x25d/0x4f0 [ 338.320363] ? do_raw_spin_trylock+0x190/0x190 [ 338.320381] ? rcu_pm_notify+0xc0/0xc0 [ 338.320400] ? strncpy_from_user+0x323/0x430 [ 338.320421] ? mpi_resize+0x200/0x200 [ 338.320452] ? getname_flags+0x256/0x580 [ 338.320476] compat_SyS_execve+0x3f/0x50 [ 338.320488] ? SyS_execveat+0x60/0x60 [ 338.320498] do_fast_syscall_32+0x3ee/0xf9d [ 338.320521] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.320543] ? lockdep_sys_exit+0x47/0xf0 [ 338.320554] ? syscall_return_slowpath+0x2ad/0x550 [ 338.320571] ? sysret32_from_system_call+0x5/0x3b [ 338.320591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.320620] entry_SYSENTER_compat+0x51/0x60 [ 338.320627] RIP: 0023:0xf7f66c79 [ 338.320632] RSP: 002b:00000000f776208c EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 338.320642] RAX: ffffffffffffffda RBX: 0000000020f8aff8 RCX: 0000000020a7bfc8 [ 338.320647] RDX: 00000000206fcff0 RSI: 0000000000000000 RDI: 0000000000000000 [ 338.320652] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.320657] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.320662] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.325209] FAULT_INJECTION: forcing a failure. [ 338.325209] name failslab, interval 1, probability 0, space 0, times 0 [ 338.325217] CPU: 0 PID: 24770 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.325221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.325224] Call Trace: [ 338.325233] dump_stack+0x194/0x257 [ 338.325247] ? arch_local_irq_restore+0x53/0x53 [ 338.325272] should_fail+0x8c0/0xa40 [ 338.325289] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.325301] ? depot_save_stack+0x12c/0x490 [ 338.325320] ? find_held_lock+0x39/0x1d0 [ 338.325346] ? lock_downgrade+0x980/0x980 [ 338.325379] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.325393] ? rcu_note_context_switch+0x710/0x710 [ 338.325417] should_failslab+0xec/0x120 [ 338.325428] __kmalloc_track_caller+0x5f/0x760 [ 338.325434] ? rcu_pm_notify+0xc0/0xc0 [ 338.325449] ? prepare_creds+0x78/0x360 [ 338.325456] ? selinux_cred_prepare+0x43/0xa0 [ 338.325473] kmemdup+0x24/0x50 [ 338.325485] selinux_cred_prepare+0x43/0xa0 [ 338.325497] security_prepare_creds+0x7d/0xb0 [ 338.325512] prepare_creds+0x2b1/0x360 [ 338.325522] ? abort_creds+0x130/0x130 [ 338.325534] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 338.325541] ? __lockdep_init_map+0xe4/0x650 [ 338.325558] copy_creds+0x7b/0x3a0 [ 338.325576] copy_process.part.36+0xb28/0x4ae0 [ 338.325587] ? __lock_acquire+0x6e9/0x47f0 [ 338.325613] ? __cleanup_sighand+0x40/0x40 [ 338.325635] ? print_usage_bug+0x3f0/0x3f0 [ 338.325641] ? wake_up_page_bit+0x530/0x530 [ 338.325654] ? __lock_is_held+0xbc/0x140 [ 338.325692] ? __lock_acquire+0x6e9/0x47f0 [ 338.325716] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.325738] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.325746] ? get_mem_cgroup_from_mm+0x49b/0x710 [ 338.325755] ? check_noncircular+0x20/0x20 [ 338.325765] ? print_usage_bug+0x3f0/0x3f0 [ 338.325776] ? print_usage_bug+0x3f0/0x3f0 [ 338.325789] ? check_noncircular+0x20/0x20 [ 338.325805] ? lock_acquire+0x1d5/0x580 [ 338.325814] ? __fdget_pos+0x131/0x1a0 [ 338.325829] ? check_noncircular+0x20/0x20 [ 338.325854] ? lock_downgrade+0x980/0x980 [ 338.325864] ? check_noncircular+0x20/0x20 [ 338.325885] ? find_held_lock+0x39/0x1d0 [ 338.325896] ? check_noncircular+0x20/0x20 [ 338.325916] ? lock_downgrade+0x980/0x980 [ 338.325925] ? __lock_is_held+0xbc/0x140 [ 338.325951] ? find_held_lock+0x39/0x1d0 [ 338.325977] ? lock_downgrade+0x980/0x980 [ 338.325988] ? get_pid_task+0xbc/0x140 [ 338.325999] ? proc_fail_nth_write+0xb5/0x260 [ 338.326010] ? map_files_get_link+0x3a0/0x3a0 [ 338.326016] ? __lock_is_held+0xbc/0x140 [ 338.326034] _do_fork+0x1ef/0xff0 [ 338.326053] ? fork_idle+0x2d0/0x2d0 [ 338.326068] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.326078] ? kernel_read+0x120/0x120 [ 338.326089] ? wait_for_completion+0x7b0/0x7b0 [ 338.326111] ? __lock_is_held+0xbc/0x140 [ 338.326144] ? __sb_end_write+0x9e/0xd0 [ 338.326160] ? fput+0xd2/0x140 [ 338.326170] ? SyS_write+0x184/0x220 [ 338.326178] ? __do_page_fault+0x3d6/0xc90 [ 338.326190] ? SyS_read+0x220/0x220 [ 338.326209] SyS_clone+0x37/0x50 [ 338.326218] ? entry_INT80_compat+0x40/0x40 [ 338.326230] do_fast_syscall_32+0x3ee/0xf9d [ 338.326249] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.326267] ? lockdep_sys_exit+0x47/0xf0 [ 338.326277] ? syscall_return_slowpath+0x2ad/0x550 [ 338.326291] ? sysret32_from_system_call+0x5/0x3b [ 338.326308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.326328] entry_SYSENTER_compat+0x51/0x60 [ 338.326334] RIP: 0023:0xf7f06c79 [ 338.326338] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.326346] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.326350] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.326354] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.326359] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.326363] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.358131] FAULT_INJECTION: forcing a failure. [ 338.358131] name failslab, interval 1, probability 0, space 0, times 0 [ 338.358141] CPU: 0 PID: 24783 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.358146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.358149] Call Trace: [ 338.358161] dump_stack+0x194/0x257 [ 338.358176] ? arch_local_irq_restore+0x53/0x53 [ 338.358186] ? __save_stack_trace+0x7e/0xd0 [ 338.358214] should_fail+0x8c0/0xa40 [ 338.358231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.358247] ? find_held_lock+0x39/0x1d0 [ 338.358265] ? find_held_lock+0x39/0x1d0 [ 338.358295] ? lock_downgrade+0x980/0x980 [ 338.358332] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 338.358348] ? rcu_note_context_switch+0x710/0x710 [ 338.358358] ? kvm_clock_get_cycles+0x25/0x30 [ 338.358377] should_failslab+0xec/0x120 [ 338.358390] kmem_cache_alloc_trace+0x4b/0x750 [ 338.358399] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 338.358406] ? __lockdep_init_map+0xe4/0x650 [ 338.358419] ? __lockdep_init_map+0xe4/0x650 [ 338.358437] lockdep_init_task+0x187/0x210 [ 338.358450] copy_process.part.36+0x16eb/0x4ae0 [ 338.358487] ? __cleanup_sighand+0x40/0x40 [ 338.358512] ? print_usage_bug+0x3f0/0x3f0 [ 338.358520] ? wake_up_page_bit+0x530/0x530 [ 338.358535] ? __lock_is_held+0xbc/0x140 [ 338.358578] ? __lock_acquire+0x6e9/0x47f0 [ 338.358605] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.358631] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 338.358640] ? get_mem_cgroup_from_mm+0x49b/0x710 [ 338.358651] ? check_noncircular+0x20/0x20 [ 338.358662] ? print_usage_bug+0x3f0/0x3f0 [ 338.358674] ? print_usage_bug+0x3f0/0x3f0 [ 338.358689] ? check_noncircular+0x20/0x20 [ 338.358707] ? lock_acquire+0x1d5/0x580 [ 338.358717] ? __fdget_pos+0x131/0x1a0 [ 338.358730] ? check_noncircular+0x20/0x20 [ 338.358753] ? lock_downgrade+0x980/0x980 [ 338.358763] ? check_noncircular+0x20/0x20 [ 338.358786] ? find_held_lock+0x39/0x1d0 [ 338.358796] ? check_noncircular+0x20/0x20 [ 338.358817] ? lock_downgrade+0x980/0x980 [ 338.358826] ? __lock_is_held+0xbc/0x140 [ 338.358853] ? find_held_lock+0x39/0x1d0 [ 338.358882] ? lock_downgrade+0x980/0x980 [ 338.358895] ? get_pid_task+0xbc/0x140 [ 338.358908] ? proc_fail_nth_write+0xb5/0x260 [ 338.358920] ? map_files_get_link+0x3a0/0x3a0 [ 338.358927] ? __lock_is_held+0xbc/0x140 [ 338.358949] _do_fork+0x1ef/0xff0 [ 338.358970] ? fork_idle+0x2d0/0x2d0 [ 338.358988] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 338.358999] ? kernel_read+0x120/0x120 [ 338.359017] ? wait_for_completion+0x7b0/0x7b0 [ 338.359038] ? __lock_is_held+0xbc/0x140 [ 338.359075] ? __sb_end_write+0x9e/0xd0 [ 338.359096] ? fput+0xd2/0x140 [ 338.359107] ? SyS_write+0x184/0x220 [ 338.359117] ? __do_page_fault+0x3d6/0xc90 [ 338.359132] ? SyS_read+0x220/0x220 [ 338.359152] SyS_clone+0x37/0x50 [ 338.359162] ? entry_INT80_compat+0x40/0x40 [ 338.359177] do_fast_syscall_32+0x3ee/0xf9d [ 338.359201] ? do_int80_syscall_32+0x9d0/0x9d0 [ 338.359220] ? lockdep_sys_exit+0x47/0xf0 [ 338.359233] ? syscall_return_slowpath+0x2ad/0x550 [ 338.359250] ? sysret32_from_system_call+0x5/0x3b [ 338.359269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.359289] entry_SYSENTER_compat+0x51/0x60 [ 338.359296] RIP: 0023:0xf7f06c79 [ 338.359300] RSP: 002b:00000000f770208c EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.359308] RAX: ffffffffffffffda RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.359313] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.359318] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.359322] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.359327] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.377507] kasan: CONFIG_KASAN_INLINE enabled [ 338.377510] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 338.377518] general protection fault: 0000 [#1] SMP KASAN [ 338.377523] Dumping ftrace buffer: [ 338.377527] (ftrace buffer empty) [ 338.377529] Modules linked in: [ 338.377538] CPU: 1 PID: 24788 Comm: syz-executor3 Not tainted 4.15.0-rc2+ #120 [ 338.377541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.377550] RIP: 0010:lockdep_invariant_state+0xd6/0x120 [ 338.377554] RSP: 0018:ffff8801c406fe48 EFLAGS: 00010002 [ 338.377559] RAX: dffffc0000000000 RBX: 0000000000001d88 RCX: ffffffff81008dab [ 338.377563] RDX: 00000000000003bc RSI: 0000000000000000 RDI: 0000000000001de0 [ 338.377567] RBP: ffff8801c406fe58 R08: 1ffffffff0d2abdb R09: 0000000000000000 [ 338.377571] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.377575] R13: ffff8801c406ff20 R14: ffff8801c406ff58 R15: ffff8801d81b6300 [ 338.377581] FS: 0000000000000000(0000) GS:ffff8801db500000(0063) knlGS:00000000f7702b40 [ 338.377585] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 338.377589] CR2: 0000000020c08000 CR3: 00000001c891a000 CR4: 00000000001406e0 [ 338.377600] DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000020000000 [ 338.377604] DR3: 0000000020001000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 338.377606] Call Trace: [ 338.377615] lockdep_sys_exit+0x47/0xf0 [ 338.377624] syscall_return_slowpath+0x240/0x550 [ 338.377635] ? prepare_exit_to_usermode+0x340/0x340 [ 338.377645] ? copy_overflow+0x20/0x20 [ 338.377663] ret_from_fork+0x15/0x30 [ 338.377668] RIP: 0023:0xf7f06c79 [ 338.377671] RSP: 002b:0000000020fbf000 EFLAGS: 00000296 ORIG_RAX: 0000000000000078 [ 338.377678] RAX: 0000000000000000 RBX: 0000000000000200 RCX: 0000000020fbf000 [ 338.377682] RDX: 0000000020744000 RSI: 0000000020f8b000 RDI: 0000000020804000 [ 338.377686] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 338.377689] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.377693] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 338.377708] Code: 83 90 11 00 00 83 e0 3f 48 89 c2 48 c1 e2 04 48 29 c2 48 b8 00 00 00 00 00 fc ff df 49 8d 1c d4 48 8d 7b 58 48 89 fa 48 c1 ea 03 <80> 3c 02 00 75 2f 48 c7 43 58 00 00 00 00 5b 41 5c 5d c3 0f ff [ 338.377819] RIP: lockdep_invariant_state+0xd6/0x120 RSP: ffff8801c406fe48 [ 338.377826] ---[ end trace 7b017090a1c310d0 ]--- [ 338.377830] Kernel panic - not syncing: Fatal exception [ 338.378539] Dumping ftrace buffer: [ 338.378541] (ftrace buffer empty) [ 338.378544] Kernel Offset: disabled [ 340.909533] Rebooting in 86400 seconds..